Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Fink, Glenn"'
Threat hunting analyzes large, noisy, high-dimensional data to find sparse adversarial behavior. We believe adversarial activities, however they are disguised, are extremely difficult to completely obscure in high dimensional space. In this paper, we
Externí odkaz:
http://arxiv.org/abs/2411.07089
Autor:
Fink, Glenn Allen
Much computer communications activity is invisible to the user, happening without explicit permission. When system administrators investigate network communications activities, they have difficulty tracing them back to the processes that cause them.
Externí odkaz:
http://hdl.handle.net/10919/28770
http://scholar.lib.vt.edu/theses/available/etd-08232006-203521/
http://scholar.lib.vt.edu/theses/available/etd-08232006-203521/
Autor:
Xu, Weifeng, Fink, Glenn A.
Publikováno v:
The 3rd Workshop on Trusted Smart Contracts In Association with Financial Cryptography 2019, St. Kitts, Feb. 2019
Smart contracts are appealing because they are self-executing business agreements between parties with the predefined and immutable obligations and rights. However, as with all software, smart contracts may contain vulnerabilities because of design f
Externí odkaz:
http://arxiv.org/abs/1912.04051
Autor:
Fink, Glenn A., McKenzie, Penny
Cyber-physical systems, especially in critical infrastructures, have become primary hacking targets in international conflicts and diplomacy. However, cyber-physical systems present unique challenges to defenders, starting with an inability to commun
Externí odkaz:
http://arxiv.org/abs/1904.07374
Publikováno v:
2015 International Conference on Collaboration Technologies & Systems (CTS); 2015, p27-34, 8p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2014 7th International Symposium on Resilient Control Systems (ISRCS); 2014, p1-8, 8p
Publikováno v:
2014 IEEE Eighth International Conference on Self-Adaptive & Self-Organizing Systems; 2014, p120-128, 9p
Publikováno v:
Foundations of Augmented Cognition (9783642394539); 2013, p656-665, 10p