Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Egon Kidmose"'
Publikováno v:
IEEE Access, Vol 8, Pp 108748-108765 (2020)
Malware and cyber-attacks cause substantial damage to corporations. A common countermeasure is Intrusion Detection Systems (IDSs). Unfortunately, IDSs typically raise many alerts on a single incident, with redundant information, and false alerts that
Externí odkaz:
https://doaj.org/article/5f83265c3b5a4251b391878e1200d862
Publikováno v:
Hageman, K, Kidmose, E, Hansen, R R & Pedersen, J M 2022, Understanding the Challenges of Blocking Unnamed Network Traffic. in P Varga, L Z Granville, A Galis, I Godor, N Limam, P Chemouil, J Francois & M-O Pahl (eds), NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022 ., 9789854, IEEE, IEEE/IFIP Network Operations and Management Symposium, pp. 1-5, IEEE Symposium on Network Operations and Management, Budapest, Hungary, 25/04/2023 . https://doi.org/10.1109/NOMS54207.2022.9789854
Network traffic that is not preceded by any Domain Name System (DNS) resolutions is referred to as unnamed traffic. Any DNS-based security system is ineffective against malicious content distributed through this traffic. In this paper, we introduce a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::45967326e0bbe99e3602d3d6d7716a76
https://vbn.aau.dk/da/publications/d474c726-64fa-4884-a3be-aeda552c4963
https://vbn.aau.dk/da/publications/d474c726-64fa-4884-a3be-aeda552c4963
Publikováno v:
CyberSA
Mahmoud, R-V, Kidmose, E, Türkmen, A, Pilawka, O P & Pedersen, J M 2021, DefAtt-Architecture of Virtual Cyber Labs for Research and Education . in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) ., 9478236, IEEE, pp. 1-7, 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 14/06/2021 . https://doi.org/10.1109/CyberSA52016.2021.9478236
Mahmoud, R-V, Kidmose, E, Türkmen, A, Pilawka, O P & Pedersen, J M 2021, DefAtt-Architecture of Virtual Cyber Labs for Research and Education . in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) ., 9478236, IEEE, pp. 1-7, 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 14/06/2021 . https://doi.org/10.1109/CyberSA52016.2021.9478236
There is a need for more skilled people in cybersecurity, and initiatives are being taken all over the world to improve the education of both students and professionals. This includes establishing cyber ranges and using them for training. Despite sev
Autor:
Marios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian D. Jensen, Jens M. Pedersen
Publikováno v:
Network and System Security ISBN: 9783030927073
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ca9f514587a1629aafdc85012b2a938b
https://doi.org/10.1007/978-3-030-92708-0_11
https://doi.org/10.1007/978-3-030-92708-0_11
Publikováno v:
Hageman, K, Kidmose, E, Hansen, R R & Pedersen, J M 2021, Can a TLS certificate be phishy? in S D C di Vimercati & P Samarati (eds), Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021 . SCITEPRESS Digital Library, International Conference on Security and Cryptography-SECRYPT-Proceedings, pp. 38-49, 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 06/07/2021 . https://doi.org/10.5220/0010516600380049
SECRYPT
SECRYPT
This paper investigates the potential of using digital certificates for the detection of phishing domains. This i motivated by phishing domains that have started to abuse the (erroneous) trust of the public in browser padloc symbols, and by the large
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::38428c93673dcf13f8edca172fb2c551
https://vbn.aau.dk/da/publications/44d6226c-add9-4e92-a5cf-c3e5b4d531e9
https://vbn.aau.dk/da/publications/44d6226c-add9-4e92-a5cf-c3e5b4d531e9
Autor:
Olga Pilawka, Rasmi-Vlad Mahmoud, Dominika Illés, Rasmus Broholm, Jens Myrup Pedersen, Egon Kidmose, Rikke Magnussen
Publikováno v:
Mahmoud, R-V, Kidmose, E, Broholm, R, Pilawka, O P, Dominika Illés, D, Magnussen, R & Pedersen, J M 2020, Attack and Defend : Combining Game-Based Learning with Virtual Cyber Labs . in P Fotaris (ed.), Proceedings of the 14th European Conference on Games Based Learning . Academic Conferences and Publishing International, Proceedings of the European Conference on Games-based Learning, vol. 2020September, pp. 364-371, 14th European Conference on Game Based Learning, ECGBL 2020, Virtual, Online, 24/09/2020 . https://doi.org/10.34190/GBL.20.150
With the increasing focus on cybersecurity from both authorities and enterprises, the growing skills gap in cybersecurity is one of the biggest cybersecurity concerns. Therefore, there is an urgent need to motivate young people to choose education an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::12c3d56d45de18b32e34dd1ee3861fe2
https://vbn.aau.dk/ws/files/378904594/20ECGBL150_rvm.pdf
https://vbn.aau.dk/ws/files/378904594/20ECGBL150_rvm.pdf
Publikováno v:
Cyber Security
Kidmose, E, Stevanovic, M & Pedersen, J M 2018, Detection of malicious domains through lexical analysis . in 2018 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security) . IEEE, 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), United Kingdom, 11/06/2018 . https://doi.org/10.1109/CyberSecPODS.2018.8560665
Kidmose, E, Stevanovic, M & Pedersen, J M 2018, Detection of malicious domains through lexical analysis . in 2018 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security) . IEEE, 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), United Kingdom, 11/06/2018 . https://doi.org/10.1109/CyberSecPODS.2018.8560665
Malicious domains play an important role for many malicious operations: For example, botnets use them for avoiding hard-coded IP addresses when connecting to command-and-control servers, and they are heavily used by criminals when distributing spam a
Publikováno v:
ICDIS
Kidmose, E, Lansing, E, Brandbyge, S & Pedersen, J M 2018, Detection of malicious and abusive domain names . in Proceedings-2018 1st International Conference on Data Intelligence and Security, ICDIS 2018 . IEEE, pp. 49-56, The 1st International Conference on Data Intelligence and Security, United States, 08/04/2018 . https://doi.org/10.1109/ICDIS.2018.00015
Kidmose, E, Lansing, E, Brandbyge, S & Pedersen, J M 2018, Detection of malicious and abusive domain names . in Proceedings-2018 1st International Conference on Data Intelligence and Security, ICDIS 2018 . IEEE, pp. 49-56, The 1st International Conference on Data Intelligence and Security, United States, 08/04/2018 . https://doi.org/10.1109/ICDIS.2018.00015
The Domain Name System (DNS) is a critical component of the Internet, and as such it is widely relied upon by a large part of the world. Consequently, it can be abused for multiple purposes, with financial gain being perhaps the most obvious, and imp
Publikováno v:
Kidmose, E, Lansing, E, Brandbyge, S & Pedersen, J M 2018, ' Heuristic methods for efficient identification of abusive domain names ', International Journal On Cyber Situational Awareness (IJCSA), vol. 3, no. 1, pp. 121-142 . https://doi.org/10.22619/IJCSA.2018.100123
Domain names and the Domain Name System (DNS) are essential to the Internet, but unfortunately cybercriminals also make use of these to fulfil their nefarious agenda and gain illicit profit. In this work we survey known forms of domain and DNS abuse
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ea01f5f4252f8fe8c1bc5058f584e45f
https://vbn.aau.dk/ws/files/294177625/article23_vol3no1_2018.pdf
https://vbn.aau.dk/ws/files/294177625/article23_vol3no1_2018.pdf
Publikováno v:
Shahid, K, Kidmose, E, Olsen, R L, Petersen, L & Iov, F 2017, On the Impact of Cyberattacks on Voltage Control Coordination by ReGen Plants in Smart Grids . in IEEE International Conference on Smart Grid Communications (SmartGridComm 2017) . IEEE, IEEE International Conference on Smart Grid Communications, Dresden, Germany, 23/10/2017 . https://doi.org/10.1109/SmartGridComm.2017.8340711
SmartGridComm
SmartGridComm
Wind power and Solar photovoltaic plants are expected to jointly produce a lion\textquotesingle s share of renewable energy generation capacity needed to reach the target of having green energy around the globe. In this respect, investigation of volt
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8c7f43ffefb04680f3559bd6f60207f2
https://vbn.aau.dk/da/publications/c65f3f9f-7d2b-4f91-acf8-bae36da97f1d
https://vbn.aau.dk/da/publications/c65f3f9f-7d2b-4f91-acf8-bae36da97f1d