20   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Max Schrötter, Andreas Niemann and Bettina Schnor    
Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based intrusi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jesús Díaz-Verdejo, Javier Muñoz-Calle, Antonio Estepa Alonso, Rafael Estepa Alonso and Germán Madinabeitia    
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kotey Seth Djanie, Tchao Eric Tutu and Gadze James Dzisi    
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 p... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ali Seba, Dan Istrate, Toufik Guettari, Adrien Ugon, Andrea Pinna and Patrick Garda    
This paper addresses the development of a new technique in the sleep analysis domain. Sleep is defined as a periodic physiological state during which vigilance is suspended and reactivity to external stimulations diminished. We sleep on average between s... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Mário Antunes, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado and Tiago Murteira    
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilit... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Vassilios Moussas and Antonios Andreatos    
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Francesco Nozzoli, Irina Rashevskaya, Leonardo Ricci, Francesco Rossi, Piero Spinnato, Enrico Verroi, Paolo Zuccon and Gregorio Giovanazzi    
The search for low-energy antideuterons in cosmic rays allows the addressing of fundamental physics problems testing for the presence of primordial antimatter and the nature of Dark Matter. The PHeSCAMI (Pressurized Helium Scintillating Calorimeter for A... ver más
Revista: Instruments    Formato: Electrónico

 
en línea
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma    
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Saifudin Usman, Idris Winarno, Amang Sudarsono     Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Saifudin Usman, Idris Winarno, Amang Sudarsono     Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Christian Thiel, Claas Broecheler, Frank Ludwar, Andreas Rennings, Jens Doose and Daniel Erni    
The underwater electric potential (UEP) signature is an electric signal, which can be exploited by naval mines to be utilized as a possible trigger indicator and may cause severe damage to the vessel and the onboard crew. Hence, knowing the UEP signature... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Xuan Dau Hoang and Quynh Chi Nguyen    
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xuan Dau Hoang and Quynh Chi Nguyen    
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Waqas Haider, Gideon Creech, Yi Xie and Jiankun Hu    
The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abigail Copiaco, Leena El Neel, Tasnim Nazzal, Husameldin Mukhtar and Walid Obaid    
This study introduces an innovative all-in-one malware identification model that significantly enhances convenience and resource efficiency in classifying malware across diverse file types. Traditional malware identification methods involve the extractio... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori and Kalamullah Ramli    
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for re... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Iffat Gheyas, Gregory Epiphaniou, Carsten Maple and Subhash Lakshminarayana    
The safe and efficient function of critical national infrastructure (CNI) relies on the accurate demand forecast. Cyber-physical system-based demand forecasting systems (CDFS), typically found in CNI (such as energy, water, and transport), are highly vul... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shruti Patil, Vijayakumar Varadarajan, Devika Walimbe, Siddharth Gulechha, Sushant Shenoy, Aditya Raina and Ketan Kotecha    
Cyber security is used to protect and safeguard computers and various networks from ill-intended digital threats and attacks. It is getting more difficult in the information age due to the explosion of data and technology. There is a drastic rise in the ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Abikoye Oluwakemi Christianah,Benjamin Aruwa Gyunka,Akande Noah Oluwatobi     Pág. pp. 61 - 78
Android operating system has become very popular, with the highest market share, amongst all other mobile operating systems due to its open source nature and users friendliness. This has brought about an uncontrolled rise in malicious applications target... ver más

 
en línea
Eiman ElGhanam, Ibtihal Ahmed, Mohamed Hassan and Ahmed Osman    
Dynamic wireless charging (DWC) is a promising technology to charge Electric Vehicles (EV) using on-road charging segments (CS), also known as DWC pads. In order to ensure effective utilization of this on-the-road charging service, communication and coor... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »