DDoS Detection Based on Hardware Performance Counters Selection
C Dantas, P Pessoa, J Ferreira… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
In recent years, machine learning models have used data from Hardware Performance
Counters (HPCs) proposed to combat Distributed Denial of Service (DDoS). Several models …
Counters (HPCs) proposed to combat Distributed Denial of Service (DDoS). Several models …
Smart Network Traffic Prediction for Scientific Applications
W Schonbein, T Matsika… - 2024 32nd Euromicro …, 2024 - ieeexplore.ieee.org
Network traffic in HPC systems can impact application performance by inducing costly re-
transmissions or consuming memory bandwidth. Emerging SmartNIC technologies present …
transmissions or consuming memory bandwidth. Emerging SmartNIC technologies present …
Data analytics for modeling and visualizing attack behaviors: a case study on SSH brute force attacks
C Yao, X Luo… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
In this research, we explore a data analytics based approach for modeling and visualizing
attack behaviors. To this end, we employ Self-Organizing Map and Association Rule Mining …
attack behaviors. To this end, we employ Self-Organizing Map and Association Rule Mining …
Hardware Immune System for Embedded IoT
Malware is a major threat to present-day computing systems. With the rapid growth of
Internet of Things (IoT) devices and their usage in safety critical systems, security has …
Internet of Things (IoT) devices and their usage in safety critical systems, security has …
Malware Detection in Embedded Devices using Artificial Hardware Immunity
With the rapid proliferation of IoT devices and its growing usage in safety-critical systems,
securing these devices from malicious attacks has become increasingly challenging. Due to …
securing these devices from malicious attacks has become increasingly challenging. Due to …
[HTML][HTML] 基于硬件性能计数器的恶意软件检测技术综述
户彦飞, 文雨 - Computer Science and Application, 2022 - hanspub.org
随着各种任务交由计算机系统或移动设备处理, 大量应用软件走进人们的生活,
与之而来的是恶意软件越来越多. 对此, 主流的恶意软件检测技术弊端凸显 …
与之而来的是恶意软件越来越多. 对此, 主流的恶意软件检测技术弊端凸显 …
Guidelines for the Adoption of Artificial Intelligence in Identity and Access Management Within the Financial Services Sector
A Masawi, M Matthee - International conference on WorldS4, 2023 - Springer
Cyber-attacks are on the rise, becoming more sophisticated as technology advances and
negatively impacting people as well organisations globally. Advanced approaches to …
negatively impacting people as well organisations globally. Advanced approaches to …
[HTML][HTML] A Two-Stage Anomaly Detection Method Based on User Preference Features and the Deep Fusion Model
SL Zhang, B Zhang, YT Zhou, YX Guo, JL Tan - Applied Sciences, 2023 - mdpi.com
Rapid and accurate anomaly traffic detection is one of the most important research problems
in cyberspace situational awareness. In order to improve the accuracy and efficiency of the …
in cyberspace situational awareness. In order to improve the accuracy and efficiency of the …
Slowloris Attack Detection Using Adaptive Timeout-Based Approach.
K Talukdar, D Boro - ISeCure, 2024 - search.ebscohost.com
Abstract Distributed Denial of Service (DDoS) attacks have become a critical threat to the
Web with the increase in web-based transactions and application services offered by the …
Web with the increase in web-based transactions and application services offered by the …
Cybersecurity and High-Performance Computing Ecosystems: Opportunities and Challenges
N Sukhija, E Bautista… - Cybersecurity and High …, 2022 - taylorfrancis.com
High-performance computing (HPC) ecosystems plays a pivotal role in unlocking and
mobilizing research and innovations in society, science, engineering, technology, business …
mobilizing research and innovations in society, science, engineering, technology, business …