Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Jan Spooren"'
Autor:
Davy Preuveneers, Vera Rimmer, Ilias Tsingenopoulos, Jan Spooren, Wouter Joosen, Elisabeth Ilie-Zudor
Publikováno v:
Applied Sciences, Vol 8, Iss 12, p 2663 (2018)
The adoption of machine learning and deep learning is on the rise in the cybersecurity domain where these AI methods help strengthen traditional system monitoring and threat detection solutions. However, adversaries too are becoming more effective in
Externí odkaz:
https://doaj.org/article/966dbebfa8a54d759971e5bde993a71f
Publikováno v:
Digital Threats: Research and Practice. 2:1-24
DNS is one of the most essential components of the Internet, mapping domain names to the IP addresses behind almost every online service. Domain names are therefore also a fundamental tool for attackers to quickly locate and relocate their malicious
Publikováno v:
ACSAC
DNS is one of the most essential components of the Internet, mapping domain names to the IP addresses behind almost every online service. Domain names are therefore also a fundamental tool for attackers to quickly locate and relocate their malicious
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ef47caeb580fef12e298c71014510dd6
https://lirias.kuleuven.be/handle/123456789/642323
https://lirias.kuleuven.be/handle/123456789/642323
Publikováno v:
ICB
This paper presents a novel solution based on PPG to strengthen face authentication. Our method leverages and combines different PPG signals from multiple channels to meet two objectives. First, it complements face authentication with an additional a
Publikováno v:
SAC
Malware typically uses Domain Generation Algorithms (DGAs) as a mechanism to contact their Command and Control server. In recent years, different approaches to automatically detect generated domain names have been proposed, based on machine learning.
Autor:
Jan Spooren, Lieven Desmet, Pieter Agten, Peter Janssen, Frank Piessens, Thomas Vissers, Dirk Jumpertz, Marc Van Wesemael, Wouter Joosen
Publikováno v:
Research in Attacks, Intrusions, and Defenses ISBN: 9783319663319
RAID
RAID
© 2017, Springer International Publishing AG. This study extensively scrutinizes 14, months of registration data to identify large-scale malicious campaigns present in the.eu TLD. We explore the ecosystem and modus operandi of elaborate cybercrimina
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2b5916ee7fda7b3bc5721f27658be6c1
https://doi.org/10.1007/978-3-319-66332-6_21
https://doi.org/10.1007/978-3-319-66332-6_21
Publikováno v:
Mobile Information Systems, Vol 2017 (2017)
Active authentication is the practice of continuously verifying the identity of users, based on their context, interactions with a system, and information provided by that system. In this paper, we investigate if battery charge readings from mobile d
Publikováno v:
EUROSEC
In this paper, we present a critical assessment of the use of device fingerprinting for risk-based authentication in a state-of-practice identity and access management system. Risk-based authentication automatically elevates the level of authenticati