[HTML][HTML] Passive operating system fingerprinting revisited: Evaluation and current challenges
Fingerprinting a host's operating system is a very common yet precarious task in network,
asset, and vulnerability management. Estimating the operating system via network traffic …
asset, and vulnerability management. Estimating the operating system via network traffic …
Anomaly Detection Method for Unknown Protocols in a Power Plant ICS Network with Decision Tree
KM Lee, MY Cho, JG Kim, KH Lee - Applied Sciences, 2023 - mdpi.com
This study aimed to enhance the stability and security of power plant control network
systems by developing detectable models using artificial intelligence machine learning …
systems by developing detectable models using artificial intelligence machine learning …
Ip spoofing detection for preventing ddos attack in fog computing
One of the biggest security threats to the availability of service in Fog Computing has been
identified as Distributed Denial of Service (DDoS), whose attributes include IP address …
identified as Distributed Denial of Service (DDoS), whose attributes include IP address …
Machine learning-based active operating system fingerprinting dataset.
EP Nikas - 2022 - apothesis.lib.hmu.gr
Cyber-attacks have expanded significantly and progressed in effectiveness over the past
few years. As a result, vulnerabilities of targeted computer and network systems can be …
few years. As a result, vulnerabilities of targeted computer and network systems can be …
[PDF][PDF] Improving Cybersecurity Through Situational Awareness
RNDM Laštovička - is.muni.cz
Large-scale networks consisting of thousands of connected devices are like living
organisms, constantly changing and evolving. It is challenging for a human administrator to …
organisms, constantly changing and evolving. It is challenging for a human administrator to …
[PDF][PDF] Identifikace operačních systémů v počítačové síti
D Filakovský - is.muni.cz
Cieľom bakalárskej práce je návrh a implementácia novej metódy detekcie operačných
systémov so zameraním na dynamické siete. Me tóda spočíva vo vykonávaní špecifických …
systémov so zameraním na dynamické siete. Me tóda spočíva vo vykonávaní špecifických …