Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Lasse Øverlier"'
Autor:
Jens‐Petter Sandvik, Lasse Øverlier
Publikováno v:
Cyber Investigations. :167-204
Autor:
Lasse Øverlier
Publikováno v:
Cyber Investigations. :103-127
Autor:
Geir M. Køien, Lasse Øverlier
Publikováno v:
Wireless Personal Communications.
The on-going digitalization of our critical infrastructures is progressing fast. There is also a growing trend of serious and disrupting cyber-attacks. The digital services are often fragile, and with many weaknesses and vulnerabilities. This makes e
Autor:
Andrii Shalaginov, Lasse Øverlier
Publikováno v:
Malware Analysis Using Artificial Intelligence and Deep Learning ISBN: 9783030625818
Through the history of desktop and server-oriented malware, Microsoft Windows was notoriously known as one of the heavily attacked Operating Systems (OS). Several factors caused this, including unobstructed installation of third-party software. Unix-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3f1f40da7b39377a2259a80ec3df91e9
https://doi.org/10.1007/978-3-030-62582-5_17
https://doi.org/10.1007/978-3-030-62582-5_17
Autor:
Lasse Øverlier
Publikováno v:
Malware Analysis Using Artificial Intelligence and Deep Learning ISBN: 9783030625818
Classification of binaries is often done with limited resources spent on pre-processing the input, assuming that the resource-intensive machine learning techniques will find the optimal results. In this paper, we identify pre-processing methods to pe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::844508ce925aeaab34ac946d85f48ecb
https://doi.org/10.1007/978-3-030-62582-5_9
https://doi.org/10.1007/978-3-030-62582-5_9
Autor:
Sue E. Kase, Elizabeth K. Bowman, Serena Oggero, Lasse Øverlier, Randall J. Zimmerman, Gertjan J. Burghouts
Publikováno v:
Next-Generation Analyst VI.
The US and nations of the NATO Alliance are increasingly threatened by the global spread of terrorism, humanitarian crises/disaster response, and public health emergencies. These threats are influenced by the unprecedented rise of information sharing
Autor:
Lasse Øverlier, Paul Syverson
Publikováno v:
Privacy Enhancing Technologies ISBN: 9783540755500
Privacy Enhancing Technologies
Privacy Enhancing Technologies
In this paper we demonstrate how to reduce the overhead and delay of circuit establishment in the Tor anonymizing network by using predistributed Diffie-Hellman values. We eliminate the use of RSA encryption and decryption from circuit setup, and we
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::08511f7da4adeec4c0c890b92e37b42a
https://doi.org/10.1007/978-3-540-75551-7_9
https://doi.org/10.1007/978-3-540-75551-7_9
Autor:
Lasse Øverlier, G. Hallingstad
Publikováno v:
2007 IEEE SMC Information Assurance and Security Workshop.
This paper looks at how traffic flow confidentiality becomes more difficult to achieve as the requirement for modern, flexible networks forces confidentiality protection closer to the edge of the network. Information available at different layers of
Autor:
Lasse Øverlier, Paul Syverson
Publikováno v:
IEEE Symposium on Security and Privacy
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via
Autor:
Paul Syverson, Lasse Øverlier
Publikováno v:
Privacy Enhancing Technologies ISBN: 9783540687900
Privacy Enhancing Technologies
Privacy Enhancing Technologies
Location hidden services have received increasing attention as a means to resist censorship and protect the identity of service operators. Research and vulnerability analysis to date has mainly focused on how to locate the hidden service. But while t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2797079114215b466c0d369e876903b8
https://doi.org/10.1007/11957454_13
https://doi.org/10.1007/11957454_13