Taxonomies of attacks and vulnerabilities in computer systems
VM Igure, RD Williams - IEEE Communications Surveys & …, 2008 - ieeexplore.ieee.org
Security assessment of a system is a difficult problem. Most of the current efforts in security
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …
assessment involve searching for known vulnerabilities. Finding unknown vulnerabilities still …
Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study
Built on top of UDP, the recently standardized QUIC protocol primarily aims to gradually
replace the TCP plus TLS plus HTTP/2 model. For instance, HTTP/3 is designed to exploit …
replace the TCP plus TLS plus HTTP/2 model. For instance, HTTP/3 is designed to exploit …
Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective
Nowadays, the industrial sector is being challenged by several cybersecurity concerns.
Direct attacks by malicious persons and (or) software form part of the severe jeopardies of …
Direct attacks by malicious persons and (or) software form part of the severe jeopardies of …
Diverse firewall design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for
protecting private networks. An error in a firewall policy either creates security holes that will …
protecting private networks. An error in a firewall policy either creates security holes that will …
Privacy-preserving decision trees over vertically partitioned data
Privacy and security concerns can prevent sharing of data, derailing data mining projects.
Distributed knowledge discovery, if done correctly, can alleviate this problem. In this paper …
Distributed knowledge discovery, if done correctly, can alleviate this problem. In this paper …
Performance modeling and analysis of network firewalls
Network firewalls act as the first line of defense against unwanted and malicious traffic
targeting Internet servers. Predicting the overall firewall performance is crucial to network …
targeting Internet servers. Predicting the overall firewall performance is crucial to network …
Off-path TCP sequence number inference attack-how firewall middleboxes reduce security
In this paper, we report a newly discovered" off-path TCP sequence number inference"
attack enabled by firewall middle boxes. It allows an off-path (ie, not man-in-the-middle) …
attack enabled by firewall middle boxes. It allows an off-path (ie, not man-in-the-middle) …
Brain Computer Interface issues on hand movement
PK Pattnaik, J Sarraf - Journal of King Saud University …, 2018 - cntttest.vanlanguni.edu.vn
All the higher order ANNs (HONNs) including functional link ANN (FLANN) are sensitive to
random initialization of weight and rely on the learning algorithms adopted. Although a …
random initialization of weight and rely on the learning algorithms adopted. Although a …
Empirical analysis of system-level vulnerability metrics through actual attacks
The Common Vulnerability Scoring System (CVSS) is a widely used and well-established
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …