Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Md. Ahsan Ayub"'
Autor:
Md. Ahsan Ayub, Ambareen Sirai
Publikováno v:
2021 IEEE Symposium Series on Computational Intelligence (SSCI).
Publikováno v:
CSCloud/EdgeCom
Botnets often use Domain Generating Algorithms (DGAs) to facilitate covert server communication in carrying out different types of cyber-attacks. Attackers employ these algorithms to generate millions of sites for victim machines to connect to, thus
Autor:
Md. Ahsan Ayub, Maruf Rayhan
Publikováno v:
2020 23rd International Conference on Computer and Information Technology (ICCIT).
In modern days, there has been a significant surge of Domain Generating Algorithms (DGAs) based various types of cyber attacks executed by adversaries to facilitate covert server communication with the help of botnets. Such algorithms provide attacke
Autor:
Md. Ahsan Ayub, Kazi A. Kalpoma, Sujoy Chowdhury, Rashedun Nobi Chowdhury, Mohammed Rashedul Islam, Anik Chowdhury, Maliha M. Chowdhury
Publikováno v:
2020 23rd International Conference on Computer and Information Technology (ICCIT).
The use of Intrusion Detection System (IDS) as one of the most trusted layers of security to an organization to defend against all sorts of cyber attacks is ubiquitous. The uniqueness as well as the severity of recent cyber threats is significant. Th
Autor:
Md. Ahsan Ayub, Sm Mukbul Hossain
Publikováno v:
2020 23rd International Conference on Computer and Information Technology (ICCIT).
Embedding malicious codes in Portable Document Format (PDF) files has been one of the prime a venues i n a never-ending cat and mouse game between malware authors and malware analysts in past decade. By planting such malicious files in a victim machi
Publikováno v:
IRI
Proceedings-2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020, 319-324
STARTPAGE=319;ENDPAGE=324;TITLE=Proceedings-2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020
Proceedings-2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020, 319-324
STARTPAGE=319;ENDPAGE=324;TITLE=Proceedings-2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020
In recent times, there has been a global surge of ransomware attacks targeted at industries of various types and sizes from retail to critical infrastructure. Ransomware researchers are constantly coming across new kinds of ransomware samples every d
Publikováno v:
CISS
Intrusion Detection Systems (IDS) have a long history as an effective network defensive mechanism. The systems alert defenders of suspicious and / or malicious behavior detected on the network. With technological advances in AI over the past decade,
Publikováno v:
2019 22nd International Conference on Computer and Information Technology (ICCIT).
RSA algorithm is an asymmetric encryption algorithm used to maintain confidentiality and integrity of data as it is transported across networks. As time has gone on, security and confidentiality has grown in importance leading to more data requiring
Publikováno v:
CSE/EUC
Network covert channels are used in various cyberattacks, including disclosure of sensitive information and enabling stealth tunnels for botnet commands. With time and technology, covert channels are becoming more prevalent, complex, and difficult to
Autor:
Rakib Ibna Hamid Chowdhury, Syed Mehrab Kabir, Humaira Tasnim Proma, Kazi A. Kalpoma, Md. Ahsan Ayub
Publikováno v:
2017 20th International Conference of Computer and Information Technology (ICCIT).
Constraint Satisfaction Problem (CSP) is observed in various applications, i.e., scheduling problems, timetabling problems, assignment problems, etc. Researchers adopt a CSP technique to tackle a certain problem; however, each technique follows diffe