Prediction, detection, and mitigation of DDOS attacks using hpcs: Design for a safer adaptive infrastructure

PP Do Nascimento, IFAF Colares, R Maciel… - … of Research on Cyber …, 2021 - igi-global.com
Web service interruptions caused by DDoS (distributed denial of service) attacks have
increased considerably over the years, and intrusion detection systems (IDS) are not …

Hardware-assisted detection of malware in automotive-based systems

Y Singh, AP Kuruvila, K Basu - … & Test in Europe Conference & …, 2021 - ieeexplore.ieee.org
In the age of Internet-of-Things (IoT), automobiles have become heavily integrated and
reliant on computerized components for system functionality. Modern vehicles have many …

Hardware-Assisted Non-Intrusive Security Controls for Modern Industrial Control Systems

PHN Rajput - 2023 - search.proquest.com
Abstract Traditionally, Industrial Control System (ICS) devices remained isolated from the
Information Technology (IT) systems of the enterprise network, creating a boundary often …

EXPLORING A NOVEL FRAMEWORK FOR DOS/DDOS ATTACK DETECTION AND SIMULATION IN CONTEMPORARY NETWORKS.

GS Rao, PK SUBBARAO - i-manager's Journal on Software …, 2024 - search.ebscohost.com
Currently, the internet serves as the predominant means of communication and is utilized by
a vast number of individuals worldwide. Simultaneously, the commercial aspect of the …

Using hardware performance counters for detecting control hijacking attacks

M Yu - 2022 - eprints.soton.ac.uk
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related
vulnerability. New code reuse techniques used for the control hijacking attack can …

DDoS amplification attacks and impacts on enterprise service-oriented network infrastructures: DNS servers

DA Byamukama, J Ngubiri - International Journal of …, 2022 - inderscienceonline.com
Globally, government agencies have adopted ICTs in the process of service delivery
especially in developing countries. Protecting the assets of government is a crucial …

Hardware performance counters (HPCs) for anomaly detection

LL Woo - Hardware Supply Chain Security: Threat Modelling …, 2021 - Springer
Modern microprocessors have special, on-chip hardware that monitor the performance of
the processors. This special, on-chip hardware is known as Hardware Performance …

A parallel exact solver for the three-index quadratic assignment problem

F Galea, B Le Cun - 2011 IEEE International Symposium on …, 2011 - ieeexplore.ieee.org
Computers with multiple processor cores using shared memory are now ubiquitous. This
paper reports an implementation of a branch-and-bound-based exact algorithm for the …

Deep Learning Based Models for Cognitive Autonomy and Cybersecurity Intelligence in Autonomous Systems

G Mani - 2022 - hammer.purdue.edu
Cognitive autonomy of an autonomous system depends on its cyber module's ability to
comprehend the actions and intent of the applications and services running on that system …

Modelling and visualising SSH brute force attack behaviours through a hybrid learning framework

X Luo, C Yao… - International Journal of …, 2021 - inderscienceonline.com
Much research has focused on increasing the network anomaly detection rate while
reducing the false positive rate through exploring different learning algorithms. However …