[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges

M Laštovička, M Husák, P Velan, T Jirsík, P Čeleda - Computer Networks, 2023 - Elsevier
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …

Anomaly Detection Method for Unknown Protocols in a Power Plant ICS Network with Decision Tree

KM Lee, MY Cho, JG Kim, KH Lee - Applied Sciences, 2023 - mdpi.com
This study aimed to enhance the stability and security of power plant control network
systems by developing detectable models using artificial intelligence machine learning …

Ip spoofing detection for preventing ddos attack in fog computing

AE Agoni, M Dlodlo - 2018 Global Wireless Summit (GWS), 2018 - ieeexplore.ieee.org
One of the biggest security threats to the availability of service in Fog Computing has been
identified as Distributed Denial of Service (DDoS), whose attributes include IP address …

Machine learning-based active operating system fingerprinting dataset.

EP Nikas - 2022 - apothesis.lib.hmu.gr
Cyber-attacks have expanded significantly and progressed in effectiveness over the past
few years. As a result, vulnerabilities of targeted computer and network systems can be …

[PDF][PDF] Improving Cybersecurity Through Situational Awareness

RNDM Laštovička - is.muni.cz
Large-scale networks consisting of thousands of connected devices are like living
organisms, constantly changing and evolving. It is challenging for a human administrator to …

[PDF][PDF] Identifikace operačních systémů v počítačové síti

D Filakovský - is.muni.cz
Cieľom bakalárskej práce je návrh a implementácia novej metódy detekcie operačných
systémov so zameraním na dynamické siete. Me tóda spočíva vo vykonávaní špecifických …