Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Karim Ganame"'
Publikováno v:
Artificial Intelligence for Cyber-Physical Systems Hardening ISBN: 9783031162367
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a4d4d10b71f97ae6368a63594427c92
https://doi.org/10.1007/978-3-031-16237-4_5
https://doi.org/10.1007/978-3-031-16237-4_5
Publikováno v:
Artificial Intelligence for Cyber-Physical Systems Hardening ISBN: 9783031162367
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::46c481a3848e74e078ae676ac0422774
https://doi.org/10.1007/978-3-031-16237-4_4
https://doi.org/10.1007/978-3-031-16237-4_4
Publikováno v:
Journal of Computer Security. 28:337-373
Publikováno v:
Foundations and Practice of Security ISBN: 9783030453701
FPS
FPS
To date, only a small amount of research has focused on detecting ransomware at the network level, and none of the published proposals have addressed the challenges raised by the fact that an increasing number of ransomware are using encrypted channe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3a9b9122e0c2319774160954b6521598
https://doi.org/10.1007/978-3-030-45371-8_22
https://doi.org/10.1007/978-3-030-45371-8_22
Publikováno v:
CNS
Cloud computing endpoints security monitoring faces more challenges compared with traditional networks due to the ephemeral nature of cloud assets. Existing endpoint security monitors use agents that must be installed on every computing host or endpo
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319691541
ISDDC
ISDDC
The number of cyber threats is constantly increasing. In 2013, 200,000 malicious tools were identified each day by antivirus vendors. This figure rose to 800,000 per day in 2014 and then to 1.8 million per day in 2016! The bar of 3 million per day wi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74ae4da606cd91ed5cdd87a33a4b0f30
https://doi.org/10.1007/978-3-319-69155-8_13
https://doi.org/10.1007/978-3-319-69155-8_13
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319691541
ISDDC
ISDDC
HTTP botnets are currently the most popular form of botnets compared to IRC and P2P botnets. This is because, they are not only easier to implement, operate, and maintain, but they can easily evade the detection. Likewise, HTTP botnets flows can easi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::31f7c403a3d63d0c55ab593cf2338a94
https://doi.org/10.1007/978-3-319-69155-8_1
https://doi.org/10.1007/978-3-319-69155-8_1
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319691541
ISDDC
ISDDC
Domain generation algorithm (DGA) represents a safe haven for modern botnets, as it enables them to escape detection. Due to the fact that DGA domains are generated randomly, they tend to be unusually long, which can be leveraged toward detecting the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c263c79dd6fe3b8447b9e4d4327b1535
https://doi.org/10.1007/978-3-319-69155-8_2
https://doi.org/10.1007/978-3-319-69155-8_2
Publikováno v:
Computers and Security
Computers and Security, Elsevier, 2008, pp.30--47
IPDPS
Computers and Security, Elsevier, 2008, pp.30--47
IPDPS
International audience; Detecting all kinds of intrusions efficiently requires a global view of the monitored network. Built to increase the security of computer networks, traditional IDS are unfortunately unable to give a global view of the security
Publikováno v:
Lecture Notes in Geoinformation and Cartography ISBN: 9783540376286
IF&GIS
Scopus-Elsevier
IF&GIS
Scopus-Elsevier
It is somewhat problematic to evaluate the performance of security systems in the Internet due to complexity of these systems and the Internet itself. Therefore, modeling and simulation are becoming more and more important in optimizing the behavior
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a669a86d43b7ceae542351df8cf571a6
https://doi.org/10.1007/978-3-540-37629-3_8
https://doi.org/10.1007/978-3-540-37629-3_8