Synchronization power depends on the register size

Y Aiek, G Stupp - Proceedings of 1993 IEEE 34th Annual …, 1993 - ieeexplore.ieee.org
Though it is common practice to treat synchronization primitives for multiprocessors as
abstract data types, they are in reality machine instructions on registers. A crucial theoretical …

Comparison of empirical data from two honeynets and a distributed honeypot network

R Bloomfield, I Gashi, A Povyakalo… - … on Software Reliability …, 2008 - ieeexplore.ieee.org
In this paper we present empirical results and speculative analysis based on observations
collected over a two month period from studies with two high interaction honeynets …

Improving the performance efficiency of an ids by exploiting temporal locality in network traffic

GS Shenoy, J Tubella, A Gonz'lez - 2012 IEEE 20th …, 2012 - ieeexplore.ieee.org
Network traffic has traditionally exhibited temporal locality in the header field of packets.
Such locality is intuitive and is a consequence of the semantics of network protocols …

3-3 Data Mining Applied to Darknet Traffic Analysis

T Ban - Journal of the National Institute of Information and …, 2017 - jstage.jst.go.jp
The proliferation of malicious soffware—so called malware—poses a major threat to the
confidentiality, integrity, and availability of the data stored and communicated using the …

[PDF][PDF] Hive: an open infrastructure for malware collection and analysis

D Cavalca, E Goldoni - proceedings of the 1st workshop on open …, 2008 - netlab-mn.unipv.it
Honeynets have become an important tool for researchers and network operators. However,
the lack of a unified honeynet data model has impeded their effectiveness, resulting in …

Detection of Unknown Cyber Attacks Using Convolution Kernels Over Attributed Language Models

P Duessel - 2018 - bonndoc.ulb.uni-bonn.de
Over the past decade the Internet has emerged as a key communication platform for
businesses and private users demonstrated by an exponential increase of hosts connected …

[图书][B] Mitigating denial of service attacks in computer networks

J Mölsä - 2006 - aaltodoc.aalto.fi
This dissertation studies how to defend against denial of service (DoS) attacks in computer
networks. As it is not possible to prevent these attacks, one must concentrate on mitigating …

An open architecture for distributed malware collection and analysis

D Cavalca, E Goldoni - Open Source Software for Digital Forensics, 2009 - Springer
Honeynets have become an important tool for researchers and network operators. However,
the lack of a unified honeynet data model has impeded their effectiveness, resulting in …

Empirical studies based on honeypots for characterizing attackers behavior

B Sobesto - 2015 - search.proquest.com
Dissertation 4-21 Page 1 ABSTRACT Title of Document: EMPIRICAL STUDIES BASED ON
HONEYPOTS FOR CHARACTERIZING ATTACKERS BEHAVIOR Bertrand Sobesto, Doctor of …

HUNT: USING HONEYTOKENS TO UNDERSTAND AND INFLUENCE THE EXECUTION OF AN ATTACK.

C SĂNDESCU, R RUGHINIȘ… - eLearning & Software …, 2017 - search.ebscohost.com
World wide data infrastructure has increased in dimension and complexity due to
consolidation, centralization and virtualization trends during the last 10 years. Being able to …