A framework based on time and space for analyzing denial of service attacks

J Chang, R Xue - 2012 Fourth International Symposium on …, 2012 - ieeexplore.ieee.org
In recent years, people are paying more attention to formalizing and analysing Denial of
Service attacks. But the analysis is almost exclusively focused on the computation cost. In …

An Intelligent Technique for Detecting Malicious Users on Mobile Stores

R Terzi, U Yavanoglu, D Sinanc… - … on Machine Learning …, 2014 - ieeexplore.ieee.org
In this study, malicious users who cause to resource exhausting are tried to detect in a
telecommunication company network. Non-Legitimate users could cause lack of information …

Some improvements to the cost-based framework for analyzing denial of service attacks

Q Yue, F Liu, R Xue - … , INTRUST 2011, Beijing, China, November 27-29 …, 2012 - Springer
Recently, people are paying more attention to formalizing and analyzing Denial of Service
(DoS) attacks, but the known analysis models are either not precise enough or not readily …

Customizing protocol specifications for detecting resource exhaustion and guessing attacks

B Groza, M Minea - International Symposium on Formal Methods for …, 2010 - Springer
Abstract Model checkers for security protocols often focus on basic properties, such as
confidentiality or authentication, using a standard model of the Dolev-Yao intruder. In this …

[PDF][PDF] Examination of vulnerabilities in Message Queuing Telemetry Transport (MQTT) in IoT Systems and implementation of countermeasures.

WAT Hidalgo, M Ghalib - researchgate.net
The accelerated expansion and commercialization of IoT devices have promoted the use of
a wide diversity of communication protocols. One of the most preeminent protocols adopted …

Protection from Within: Runtime Hardening Techniques for COTS Binaries

M Elsabagh - 2017 - search.proquest.com
Software systems are the backbone of modern life as they drive all computerized
technologies. The ever-increasing size and complexity of today's systems makes them very …

[PDF][PDF] Contributions to the security of EPC/RFID wireless technologies

J Garcia‐alfaro - 2013 - hal.science
This habilitation manuscript summarizes a selected list of research contributions in the area
of Wireless Security. The selected list of contributions is by no means exhaustive. It shall be …

[PDF][PDF] Deliverable D5. 4 Assessment of the AVANTSSAR Validation Platform

V Platform - Citeseer
We report on the assessment of the application of the AVANTSSAR Validation Platform to
the problem cases in terms of coverage and efficiency. The results of the assessment …