DDoS Detection Based on Hardware Performance Counters Selection

C Dantas, P Pessoa, J Ferreira… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
In recent years, machine learning models have used data from Hardware Performance
Counters (HPCs) proposed to combat Distributed Denial of Service (DDoS). Several models …

Smart Network Traffic Prediction for Scientific Applications

W Schonbein, T Matsika… - 2024 32nd Euromicro …, 2024 - ieeexplore.ieee.org
Network traffic in HPC systems can impact application performance by inducing costly re-
transmissions or consuming memory bandwidth. Emerging SmartNIC technologies present …

Data analytics for modeling and visualizing attack behaviors: a case study on SSH brute force attacks

C Yao, X Luo… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
In this research, we explore a data analytics based approach for modeling and visualizing
attack behaviors. To this end, we employ Self-Organizing Map and Association Rule Mining …

Hardware Immune System for Embedded IoT

F Zareen, MAF Amador, R Karam - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Malware is a major threat to present-day computing systems. With the rapid growth of
Internet of Things (IoT) devices and their usage in safety critical systems, security has …

Malware Detection in Embedded Devices using Artificial Hardware Immunity

F Zareen, MAF Amador, R Karam - 2023 - researchsquare.com
With the rapid proliferation of IoT devices and its growing usage in safety-critical systems,
securing these devices from malicious attacks has become increasingly challenging. Due to …

[HTML][HTML] 基于硬件性能计数器的恶意软件检测技术综述

户彦飞, 文雨 - Computer Science and Application, 2022 - hanspub.org
随着各种任务交由计算机系统或移动设备处理, 大量应用软件走进人们的生活,
与之而来的是恶意软件越来越多. 对此, 主流的恶意软件检测技术弊端凸显 …

Guidelines for the Adoption of Artificial Intelligence in Identity and Access Management Within the Financial Services Sector

A Masawi, M Matthee - International conference on WorldS4, 2023 - Springer
Cyber-attacks are on the rise, becoming more sophisticated as technology advances and
negatively impacting people as well organisations globally. Advanced approaches to …

[HTML][HTML] A Two-Stage Anomaly Detection Method Based on User Preference Features and the Deep Fusion Model

SL Zhang, B Zhang, YT Zhou, YX Guo, JL Tan - Applied Sciences, 2023 - mdpi.com
Rapid and accurate anomaly traffic detection is one of the most important research problems
in cyberspace situational awareness. In order to improve the accuracy and efficiency of the …

Slowloris Attack Detection Using Adaptive Timeout-Based Approach.

K Talukdar, D Boro - ISeCure, 2024 - search.ebscohost.com
Abstract Distributed Denial of Service (DDoS) attacks have become a critical threat to the
Web with the increase in web-based transactions and application services offered by the …

Cybersecurity and High-Performance Computing Ecosystems: Opportunities and Challenges

N Sukhija, E Bautista… - Cybersecurity and High …, 2022 - taylorfrancis.com
High-performance computing (HPC) ecosystems plays a pivotal role in unlocking and
mobilizing research and innovations in society, science, engineering, technology, business …