Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Stefan Burschka"'
Autor:
Benoit Dupasquier, Stefan Burschka
Publikováno v:
SSCI
IP-based networks are prone to hardware failures, software errors and misconfigurations. This leads to service outages, such as those experienced by American Airlines in 2015. Moreover, cyber threats are becoming ever more sophisticated. As demonstra
Publikováno v:
International Journal of Information Security. 9:313-325
Voice over IP (VoIP) has experienced a tremendous growth over the last few years and is now widely used among the population and for business purposes. The security of such VoIP systems is often assumed, creating a false sense of privacy. This paper
Publikováno v:
Dupasquier, B, Burschka, S, McLaughlin, K & Sezer, S 2010, On the Privacy of Encrypted Skype Communications . in 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010) . Institute of Electrical and Electronics Engineers Inc., pp. 1-5, IEEE Global Telecommunications Conference (GLOBECOM) 2010, Miami, United States, 06/12/2010 . https://doi.org/10.1109/GLOCOM.2010.5684214
GLOBECOM
GLOBECOM
The privacy of voice over IP (VoIP) systems is achieved by compressing and encrypting the sampled data. This paper investigates in detail the leakage of information from Skype, a widely used VoIP application. In this research, it has been demonstrate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::491824328af53fa77d8ff4d44b98d670
https://pure.qub.ac.uk/en/publications/49fd48db-318f-4fb1-88ea-0f30f8202f12
https://pure.qub.ac.uk/en/publications/49fd48db-318f-4fb1-88ea-0f30f8202f12
Publikováno v:
CISDA
This work focuses on testing anomaly detectors from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly detection systems two capabilities. Firstly, no knowledge of protected data stru
Publikováno v:
CISDA
Network Protocol Reverse Engineering (NPRE) has played an increasing role in honeypot operations. It allows to automatically generate Statemodels and scripts being able to act as realistic counterpart for capturing unknown malware. This work proposes
Autor:
Stefan Burschka
Publikováno v:
2009 Fourth International Conference on Critical Infrastructures.
The IP network introduced a new quality of threat when real infrastructures such as telecom, electrical, transport and banking systems were infiltrated by the virtual world with its standard PC HW and SW. Unnecessary high complexity, instable behavio
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642011283
EvoWorkshops
EvoWorkshops
The testing of anomaly detectors is considered from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly detection systems two capabilities. Firstly, no knowledge of protected data stru
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3cee64645ba6df1fb12f13d058df819
https://doi.org/10.1007/978-3-642-01129-0_13
https://doi.org/10.1007/978-3-642-01129-0_13
Autor:
Stefan Burschka, J. Mlynek
Publikováno v:
Optics Communications. 66:59-64
Optically induced and detected spin nutation, free induction decay and spin echoes are investigated in Zeeman sublevels of the 2S1/2 ground state of atomic sodium. Novel signal features related to optical saturation phenomena and dispersive effects a