Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Maros Barabas"'
Autor:
Renaud Pacalet, Zdenek Martinasek, Radek Fujdiak, Petr Blazek, Ludovic Apvrille, Petr Mlynek, Maysam Zoor, Maros Barabas, Pavel Mrnustik, David Smekal
Publikováno v:
8th Mediterranean Conference on Embedded Computing MECO2019
8th Mediterranean Conference on Embedded Computing MECO2019, Jun 2019, Budva, Montenegro
2019 8th Mediterranean Conference on Embedded Computing (MECO)
MECO
8th Mediterranean Conference on Embedded Computing MECO2019, Jun 2019, Budva, Montenegro
2019 8th Mediterranean Conference on Embedded Computing (MECO)
MECO
International audience; Nowadays, the development of products for modern cyber-physical systems consists of many stages defined by the product life cycle (PLC). However, many manufacturers are not paying full attention - if any at all - to each PLC s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e3ed850440033cf95050fe6994096831
https://hal.telecom-paris.fr/hal-02275984
https://hal.telecom-paris.fr/hal-02275984
Publikováno v:
International Journal of Engineering and Technology. :249-253
In this paper we introduce the second generation of the experimental detection framework of AIPS system which is used for experimentation with detection models and with their combinations. Our research aims mainly on detection of attacks that abuse v
Publikováno v:
ICITST
Network traffic generation was the subject of many research projects in the past, but none of them could generate network data which has the same nature as a traffic from human or machine behavior. In this paper we introduce a related work in this fi
Autor:
Zair Abdelouahab, Maher Aburrous, Eyidayo Adebola, Babak Akhgar, Sayed Alireza Hashemi Golpayegani, Ja’far Alqatawna, Omar Al-Kadi, Rizik Al-Sayyed, Faisal T. Ammari, Annamalai Annamalai, Manoj Apte, Hamid R. Arabnia, Vladimir B. Balakirsky, Maros Barabas, Gerald Baumgartner, Petra Saskia Bayerl, Timothy Bowden, Ben Brewster, Roman Busse, Petr Chmelar, Seonho Choi, John M. Colombi, Guillermo Covella, Miles Crabill, Evan Damon, David de Andrés, Alberto De la Rosa Algarín, Leonidas Deligiannidis, Nikolaos L. Dellas, Steven A. Demurjian, Alexander Dieser, Steven Drager, Michal Drozd, Hyeonsang Eom, Diogo A.B. Fernandes, Guillermo Francia, Mário M. Freire, Kaleb Ganz, Qigang Gao, Anahit R. Ghazaryan, João V. Gomes, Geff Green, Michael R. Grimaila, Petr Hanacek, Mohammad Hassanzadeh, Peng He, Douglas D. Hodson, Ivan Homoliak, Mihai Horia Zaharia, Claire Humbeutel, Pedro R.M. Inácio, David Jacques, Narges Jahangiri, Kayleigh Johnson, Dimitra I. Kaklamani, Maria N. Koukovini, Sofiane Labidi, Ville Leppänen, Georgios V. Lioudakis, Eleanor Lockley, Denivaldo Lopes, Pascal Lorenz, J. Lu, Jianbing Ma, Jens Mache, Nicolás Macia, Logan O. Mailloux, Héctor Marco, Maria Angel Marquez-Andrade, William McKeever, Davud Mohammadpur, Seyyed Mohammad Reza Farshchi, Falkner Moraes, Jeffrey D. Morris, Anas Najdawi, Samir M.R. Nasserzadeh, Holger Nitsch, Abiodun Olaluwe, Emerson Oliveira, Luis Olsina, Girish Keshav Palshikar, Eugenia I. Papagiannakopoulou, Paul R. Prucnal, Tran Quang Thanh, Victor Raskin, Sampsa Rauti, Yacine Rebahi, Mohammad Reza Movahedisefat, Ismael Ripoll, Hamzeh Roumani, Juan Carlos Ruiz, Sébastien Salva, Maryam Shahpasand, Bhavin J. Shastri, Jawed Siddiqi, Liliana F.B. Soares, Andrew Staniforth, Nary Subramanian, Kun Sun, Fahimeh Tabatabayi, Julia M. Taylor, Cenidalva Teixeira, Ariel Teles, David Thornton, Fernando G. Tinetti, Monica Trifas, Sanjai Veetil, Lakovos S. Venieris, Natalija Vlajic, Richard Weiss, Charlie Wiseman, Ben Wu, Mira Yun, Stassia R. Zafimiharisoa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b974f42c84f7b96d6af58bfa87e57c21
https://doi.org/10.1016/b978-0-12-411474-6.00043-8
https://doi.org/10.1016/b978-0-12-411474-6.00043-8
A novel behavioral detection framework is proposed to detect zero day buffer overflow vulnerabilities (based on network behavioral signatures) using zero-day exploits, instead of the signature-based or anomaly-based detection solutions currently avai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6b01ad880355cac2763da6bfaed841c1
Publikováno v:
IDAACS (2)
In this abstract, we investigate the network traffic that may cause the unauthorized control of a computer in the campus network using buffer overflow attacks, the objective of which is to gain the control of privileged programs and computers. We pro
Publikováno v:
2013 47th International Carnahan Conference on Security Technology (ICCST); 2013, p1-4, 4p
Autor:
Petr Blazek, Maros Barabas, Filip Borcik, Jiri Misurec, Pavel Mrnustik, Radek Fujdiak, Petr Mlynek
Publikováno v:
2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
NTMS
NTMS
Nowadays, software development is a more complex process than ever was and it faces the challenges, where security became one of the most crucial. The security issues became an essential part of software engineers and understanding the vulnerabilitie
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7412c4fd9b658ebf7f2251cca92643ac
Publikováno v:
2018 41st International Conference on Telecommunications and Signal Processing (TSP)
TSP
TSP
Nowadays, the security, safety and performance became a crucial part of the product life cycle (PLC) in which the requirements for these parameters are continuously growing. Therefore, it is a very challenging task to provide an efficient, well-balan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f6b36c675c3ed231bd7dc10996ef47f2