Detecting the impact of software vulnerability on attacks: A case study of network telescope scans
Network scanning is one of the first steps in gathering information about a target before
launching attacks. It is used to scan for vulnerable devices and exposed services in order to …
launching attacks. It is used to scan for vulnerable devices and exposed services in order to …
An improved authentication scheme for Internet of things
Z Xie, L Jiang - IOP Conference Series: Materials Science and …, 2020 - iopscience.iop.org
Designing a secure authentication scheme is of great importance to the practical
applications of the Internet of Things (IoT). In 2017, Wang et al. proposed an improved …
applications of the Internet of Things (IoT). In 2017, Wang et al. proposed an improved …
Establishment and mapping of heterogeneous anomalies in network intrusion datasets
L Riddell, M Ahmed, P Haskell-Dowland - Connection Science, 2022 - Taylor & Francis
Anomaly detection in the scope of network security aims to identify network instances for the
unexpected and unique, with various security operations employing such techniques to …
unexpected and unique, with various security operations employing such techniques to …
Early warning systems for cyber defence
Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually
update their typical security measures. Attackers often have a long-term interest in their …
update their typical security measures. Attackers often have a long-term interest in their …
Towards an early warning system for network attacks using bayesian inference
The Internet has become the most vulnerable part of critical civil infrastructures. Proactive
measures such as early warnings are required to reduce the risk of disasters that can be …
measures such as early warnings are required to reduce the risk of disasters that can be …
A case study: Heartbleed vulnerability management and swedish municipalities
SF Wen, S Kowalski - Human Aspects of Information Security, Privacy and …, 2017 - Springer
In Sweden, the use of open source software (OSS) in public sectors has been promoted by
the government in recent years. A number of Swedish municipalities forms interest …
the government in recent years. A number of Swedish municipalities forms interest …
Change Point Detection for Time Series Data in Complex Systems
X Gong, J Ma, M Chen, S Zong… - 2022 IEEE Asia Pacific …, 2022 - ieeexplore.ieee.org
In this work, we present a change point detection (CPD) method to detect abrupt changes in
time-series data obtained from complex systems such as large scale networks. The …
time-series data obtained from complex systems such as large scale networks. The …
Dağıtık üretim güç sistemlerinde geliştirilmiş oylama modeli tabanlı arıza tespiti ve sınıflandırması= Improved voting model based fault detection and classification in …
F Ülker - 2023 - acikerisim.sakarya.edu.tr
Mevcut elektrik güç sisteminde enerji talebinin artması ve fosil yakıtların sınırlı olması, enerji
piyasasının serbestleşmesi, ekonomik ve çevresel kaygıların etkileri sonucunda …
piyasasının serbestleşmesi, ekonomik ve çevresel kaygıların etkileri sonucunda …
[图书][B] Peeling the onion: De-encapsulation of network packets for applications in network protocol reverse engineering
PT Watrobski - 2015 - search.proquest.com
In certain forensic or military investigations, it may be of interest to monitor an unknown
network. When doing such, it may be difficult to discern packet payloads from the …
network. When doing such, it may be difficult to discern packet payloads from the …
De-encapsulation of network packets for network protocol reverse engineering
PT Watrobski, DH Summerville - MILCOM 2016-2016 IEEE …, 2016 - ieeexplore.ieee.org
In certain forensic or military investigations, it may be of interest to monitor an unknown
network. When doing such, it may be difficult to discern packet payloads from the …
network. When doing such, it may be difficult to discern packet payloads from the …