One of the goals of network administrators is to identify and block sources of attacks from a network steam. Various tools have been developed to help the administrator identify the IP …
Data analysts are tasked with the challenge of transforming an abundance of data into knowledge and insights. This complex cognitive process has been studied, and models …
M Alsaleh, A Alarifi, A Alqahtani… - Security and …, 2015 - Wiley Online Library
The prevalence and severity of application‐layer vulnerabilities increase dramatically their corresponding attacks. In this paper, we present an extension to PHPIDS, an open source …
R Sánchez, Á Herrero, E Corchado - Logic Journal of the IGPL, 2015 - ieeexplore.ieee.org
There are many security systems to protect information resources, but we are still not free from possible successful attacks. This study aims at being one step towards the proposal of …
As datasets in general grow in size and complexity over time while the human cognitive ability to interpret said datasets essentially stays the same, it becomes important to enable …
Security is essentially important for any enterprise networks. Denial of service, port scanning, and data exfiltration are among of the most common network intrusions. It's urgent …
There are many security systems to protect information resources, but we are still not free from possible successful attacks. This study aims at being one step towards the proposal of …