|
|
|
Max Schrötter, Andreas Niemann and Bettina Schnor
Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based intrusi...
ver más
|
|
|
|
|
|
|
Jesús Díaz-Verdejo, Javier Muñoz-Calle, Antonio Estepa Alonso, Rafael Estepa Alonso and Germán Madinabeitia
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been...
ver más
|
|
|
|
|
|
|
Kotey Seth Djanie, Tchao Eric Tutu and Gadze James Dzisi
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 p...
ver más
|
|
|
|
|
|
|
Ali Seba, Dan Istrate, Toufik Guettari, Adrien Ugon, Andrea Pinna and Patrick Garda
This paper addresses the development of a new technique in the sleep analysis domain. Sleep is defined as a periodic physiological state during which vigilance is suspended and reactivity to external stimulations diminished. We sleep on average between s...
ver más
|
|
|
|
|
|
|
Mário Antunes, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado and Tiago Murteira
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilit...
ver más
|
|
|
|
|
|
|
Vassilios Moussas and Antonios Andreatos
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio...
ver más
|
|
|
|
|
|
|
Francesco Nozzoli, Irina Rashevskaya, Leonardo Ricci, Francesco Rossi, Piero Spinnato, Enrico Verroi, Paolo Zuccon and Gregorio Giovanazzi
The search for low-energy antideuterons in cosmic rays allows the addressing of fundamental physics problems testing for the presence of primordial antimatter and the nature of Dark Matter. The PHeSCAMI (Pressurized Helium Scintillating Calorimeter for A...
ver más
|
|
|
|
|
|
|
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec...
ver más
|
|
|
|
|
|
|
Saifudin Usman, Idris Winarno, Amang Sudarsono
Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio...
ver más
|
|
|
|
|
|
|
Saifudin Usman, Idris Winarno, Amang Sudarsono
Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio...
ver más
|
|
|
|
|
|
|
Christian Thiel, Claas Broecheler, Frank Ludwar, Andreas Rennings, Jens Doose and Daniel Erni
The underwater electric potential (UEP) signature is an electric signal, which can be exploited by naval mines to be utilized as a possible trigger indicator and may cause severe damage to the vessel and the onboard crew. Hence, knowing the UEP signature...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Waqas Haider, Gideon Creech, Yi Xie and Jiankun Hu
The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting...
ver más
|
|
|
|
|
|
|
Abigail Copiaco, Leena El Neel, Tasnim Nazzal, Husameldin Mukhtar and Walid Obaid
This study introduces an innovative all-in-one malware identification model that significantly enhances convenience and resource efficiency in classifying malware across diverse file types. Traditional malware identification methods involve the extractio...
ver más
|
|
|
|
|
|
|
Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori and Kalamullah Ramli
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for re...
ver más
|
|
|
|
|
|
|
Iffat Gheyas, Gregory Epiphaniou, Carsten Maple and Subhash Lakshminarayana
The safe and efficient function of critical national infrastructure (CNI) relies on the accurate demand forecast. Cyber-physical system-based demand forecasting systems (CDFS), typically found in CNI (such as energy, water, and transport), are highly vul...
ver más
|
|
|
|
|
|
|
Shruti Patil, Vijayakumar Varadarajan, Devika Walimbe, Siddharth Gulechha, Sushant Shenoy, Aditya Raina and Ketan Kotecha
Cyber security is used to protect and safeguard computers and various networks from ill-intended digital threats and attacks. It is getting more difficult in the information age due to the explosion of data and technology. There is a drastic rise in the ...
ver más
|
|
|
|
|
|
|
Abikoye Oluwakemi Christianah,Benjamin Aruwa Gyunka,Akande Noah Oluwatobi
Pág. pp. 61 - 78
Android operating system has become very popular, with the highest market share, amongst all other mobile operating systems due to its open source nature and users friendliness. This has brought about an uncontrolled rise in malicious applications target...
ver más
|
|
|
|
|
|
|
Eiman ElGhanam, Ibtihal Ahmed, Mohamed Hassan and Ahmed Osman
Dynamic wireless charging (DWC) is a promising technology to charge Electric Vehicles (EV) using on-road charging segments (CS), also known as DWC pads. In order to ensure effective utilization of this on-the-road charging service, communication and coor...
ver más
|
|
|
|