Extending advanced evasion techniques using combinatorial search

M Chammem, M Hamdi, TH Kim - 2014 7th International …, 2014 - ieeexplore.ieee.org
In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring
new alternatives to reduce the complexity of existing evasion tools. The major objective is to …

[PDF][PDF] A Comprehensive Study on Intrusion and Extrusion Phenomena

MA Hamid, M Akter, MF Mridha… - International Journal of …, 2021 - academia.edu
This paper presents a comprehensive survey on intrusion and extrusion phenomena and
their existing detection and prevention techniques. Intrusion and extrusion events, breach of …

Market-neutral portfolio of trading strategies as universal indicator of market micro-regimes: from rare-event forecasting to single-example learning of emerging …

VV Gavrishchaka, V Bykov - Second International Conference …, 2007 - ieeexplore.ieee.org
Discovery of stable statistical arbitrage opportunities becomes more challenging due to
increasing number of intelligent market participants and market-related technological …

A posteriori log analysis and security rules violation detection

F Dernaïka - 2020 - theses.hal.science
In certain sensitive environments, such as the healthcare domain, where users are generally
trusted and where particular events may occur, such as emergencies, the implemented …