Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Barry Irwin"'
Publikováno v:
South African Computer Journal, Vol 31, Iss 2, Pp 77–98-77–98 (2019)
We present the design and implementation of an indirect messaging extension for the existing NFComms framework that provides communication between a network flow processor and host CPU. This extension addresses the bulk throughput limitations of the
Externí odkaz:
https://doaj.org/article/5e943f93a48545b2bb1c71a7726881fc
Publikováno v:
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities ISBN: 9783030722357
The identification of network attacks in real-time is becoming increasingly important. Most Artificial Intelligence (AI) applications use machine learning to do the classification of attack types but the advantage of an ontological approach is that a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3b12cd0f2c5945cc70389925466358f0
https://doi.org/10.1007/978-3-030-72236-4_14
https://doi.org/10.1007/978-3-030-72236-4_14
Autor:
Barry Irwin, Ibraheem Frieslaar
Publikováno v:
SAIEE Africa Research Journal, Volume: 109, Issue: 2, Pages: 101-85, Published: JUN 2018
This research investigates the Electromagnetic (EM) side channel leakage of a Raspberry Pi 2 B+. An evaluation is performed on the EM leakage as the device executes the AES-128 cryptographic algorithm contained in the libcryptoH-+ library in a thread
Publikováno v:
South African Computer Journal, Vol 31, Iss 2, Pp 77–98-77–98 (2019)
South African Computer Journal, Volume: 31, Issue: 2, Pages: 77-98, Published: DEC 2019
South African Computer Journal, Volume: 31, Issue: 2, Pages: 77-98, Published: DEC 2019
We present the design and implementation of an indirect messaging extension for the existing NFComms framework that provides communication between a network flow processor and host CPU. This extension addresses the bulk throughput limitations of the
Publikováno v:
SAICSIT
Network telescopes have been used for over a decade to aid in identifying threats by gathering unsolicited network traffic. This Internet Background Radiation (IBR) data has proved to be a significant source of intelligence in combating emerging thre
Publikováno v:
International Journal of Cyber Warfare and Terrorism. 6:17-30
The potential attack surface of a nation is large and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a nation. There are a variety of specialised data sources avail
Autor:
Barry Irwin, Peter M. Wrench
Publikováno v:
Scopus-Elsevier
The abundance of PHP-based Remote Access Trojans (or web shells) found in the wild has led malware researchers to develop systems capable of tracking and analysing these shells. In the past, such shells were ably classified using signature matching,
Autor:
Barry Irwin, L. Rudman
Publikováno v:
Scopus-Elsevier
Network Time Protocol based DDoS attacks saw a lot of popularity throughout 2014. This paper shows the characterization and analysis of two large datasets containing packets from NTP based DDoS attacks captured in South Africa. Using a series of Pyth
Publikováno v:
SAICSIT
Self-sovereign identity promises prospective users greater control, security, privacy, portability and overall greater convenience; however the immaturity of current distributed key management solutions results in general disregard of security adviso
Publikováno v:
SAICSIT
In this paper we present the design and implementation of an indirect messaging extension for the existing NFComms framework that provides communication between a network flow processor and host CPU. This extension addresses the bulk throughput limit