Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Hussain M. J. Almohri"'
Publikováno v:
IEEE Access, Vol 9, Pp 58824-58837 (2021)
Network security defenses evolve, responding to real-time attack incidents, modifying the underlying topology, or reallocating defense systems across the network. The present work emphasizes reducing the time to compute new optimal reallocations of d
Externí odkaz:
https://doaj.org/article/ba064a5a412b4dbc86509c4411cfedc7
Autor:
Boris A. Vinatzer, Lenwood S. Heath, Hussain M. J. Almohri, Michael J. Stulberg, Christopher Lowe, Song Li
Publikováno v:
Frontiers in Bioengineering and Biotechnology, Vol 7 (2019)
Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA fingerprinting methods, and single gene methods to methods relying on whole genomes. Viral Ebola and influenza genome data are being used for real-time track
Externí odkaz:
https://doaj.org/article/88ff0099d4ca45ddb0db8bb4d06d494c
Publikováno v:
IEEE Transactions on Computers. 71:2982-2995
Publikováno v:
IEEE Access, Vol 9, Pp 58824-58837 (2021)
Network security defenses evolve, responding to real-time attack incidents, modifying the underlying topology, or reallocating defense systems across the network. The present work emphasizes reducing the time to compute new optimal reallocations of d
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
This paper presents a client bootstrapping protocol for proxy-based moving target defense system for the cloud. The protocol establishes the identity of prospective clients who intend to connect to web services behind obscure proxy servers in a cloud
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:500-511
One way to combat denial-of-service attacks on cloud-based virtual networks is to use unpredictable network addresses, aiming to increase attacker effort by requiring attackers to search a large IP address space to find a target host. IP address rand
Publikováno v:
IEEE Transactions on Information Forensics and Security. 13:1361-1375
When remote command injection attacks succeed at the entry points of a cloud (servers exposed to the outside Internet), attackers targeting a specific asset in the cloud will pursue further exploration to find their targets. Attack targets, such as d
Autor:
Hussain M. J. Almohri, Christopher Lowe, Song Li, Lenwood S. Heath, Michael J. Stulberg, Boris A. Vinatzer
Publikováno v:
Frontiers in Bioengineering and Biotechnology, Vol 7 (2019)
Frontiers in Bioengineering and Biotechnology
Frontiers in Bioengineering and Biotechnology
Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA fingerprinting methods, and single gene methods to methods relying on whole genomes. Viral Ebola and influenza genome data are being used for real-time track
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 13:474-487
Securing the networks of large organizations is technically challenging due to the complex configurations and constraints. Managing these networks requires rigorous and comprehensive analysis tools. A network administrator needs to identify vulnerabl
Publikováno v:
IEEE Transactions on Information Forensics and Security. :1-1
With current IoT architectures, once a single device in a network is compromised, it can be used to disrupt the behavior of other devices on the same network. Even though system administrators can secure critical devices in the network using best pra