Detecting the impact of software vulnerability on attacks: A case study of network telescope scans

A Houmz, G Mezzour, K Zkik, M Ghogho… - Journal of Network and …, 2021 - Elsevier
Network scanning is one of the first steps in gathering information about a target before
launching attacks. It is used to scan for vulnerable devices and exposed services in order to …

An improved authentication scheme for Internet of things

Z Xie, L Jiang - IOP Conference Series: Materials Science and …, 2020 - iopscience.iop.org
Designing a secure authentication scheme is of great importance to the practical
applications of the Internet of Things (IoT). In 2017, Wang et al. proposed an improved …

Establishment and mapping of heterogeneous anomalies in network intrusion datasets

L Riddell, M Ahmed, P Haskell-Dowland - Connection Science, 2022 - Taylor & Francis
Anomaly detection in the scope of network security aims to identify network instances for the
unexpected and unique, with various security operations employing such techniques to …

Early warning systems for cyber defence

H Kalutarage, S Shaikh, BS Lee, C Lee… - Open Problems in …, 2016 - Springer
Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually
update their typical security measures. Attackers often have a long-term interest in their …

Towards an early warning system for network attacks using bayesian inference

HK Kalutarage, C Lee, SA Shaikh… - 2015 IEEE 2nd …, 2015 - ieeexplore.ieee.org
The Internet has become the most vulnerable part of critical civil infrastructures. Proactive
measures such as early warnings are required to reduce the risk of disasters that can be …

A case study: Heartbleed vulnerability management and swedish municipalities

SF Wen, S Kowalski - Human Aspects of Information Security, Privacy and …, 2017 - Springer
In Sweden, the use of open source software (OSS) in public sectors has been promoted by
the government in recent years. A number of Swedish municipalities forms interest …

Change Point Detection for Time Series Data in Complex Systems

X Gong, J Ma, M Chen, S Zong… - 2022 IEEE Asia Pacific …, 2022 - ieeexplore.ieee.org
In this work, we present a change point detection (CPD) method to detect abrupt changes in
time-series data obtained from complex systems such as large scale networks. The …

Dağıtık üretim güç sistemlerinde geliştirilmiş oylama modeli tabanlı arıza tespiti ve sınıflandırması= Improved voting model based fault detection and classification in …

F Ülker - 2023 - acikerisim.sakarya.edu.tr
Mevcut elektrik güç sisteminde enerji talebinin artması ve fosil yakıtların sınırlı olması, enerji
piyasasının serbestleşmesi, ekonomik ve çevresel kaygıların etkileri sonucunda …

[图书][B] Peeling the onion: De-encapsulation of network packets for applications in network protocol reverse engineering

PT Watrobski - 2015 - search.proquest.com
In certain forensic or military investigations, it may be of interest to monitor an unknown
network. When doing such, it may be difficult to discern packet payloads from the …

De-encapsulation of network packets for network protocol reverse engineering

PT Watrobski, DH Summerville - MILCOM 2016-2016 IEEE …, 2016 - ieeexplore.ieee.org
In certain forensic or military investigations, it may be of interest to monitor an unknown
network. When doing such, it may be difficult to discern packet payloads from the …