Chimera: A declarative language for streaming network traffic analysis

K Borders, J Springer, M Burnside - 21st USENIX security symposium …, 2012 - usenix.org
Intrusion detection systems play a vital role in network security. Central to these systems is
the language used to express policies. Ideally, this language should be powerful …

Smartphone triggered security challenges—Issues, case studies and prevention

SR Srivastava, S Dube, G Shrivastaya… - Cyber Security in …, 2019 - Wiley Online Library
In today's rapidly evolving technological scenario, mobile computing devices are always at
an increased risk of being attacked and exploited. Mobile security challenges comprise …

Protocol for mitigating the risk of hijacking social networking sites

J Cashion, M Bassiouni - 7th International Conference on …, 2011 - ieeexplore.ieee.org
The proliferation of social and collaborative media has been accompanied by an increased
level of cyber attacks on social networking and collaboration sites. One serious type of attack …

Enhancing security of cookie-based sessions in mobile networks using sparse caching

A Alabrah, J Cashion, M Bassiouni - International journal of information …, 2014 - Springer
The exponential growth in the use of mobile phones and tablets to gain wireless access to
the Internet has been accompanied by a similar growth in cyber attacks over wireless links to …

Robust and low-cost solution for preventing sidejacking attacks in wireless networks using a rolling code

J Cashion, M Bassiouni - Proceedings of the 7th ACM symposium on …, 2011 - dl.acm.org
With the recent explosion in wireless hotspots, more and more users find themselves
browsing the internet in an insecure manner. This is due to the typical lack of security in the …

A hierarchical two-tier one-way hash chain protocol for secure internet transactions

A Alabrah, M Bassiouni - 2012 IEEE Global Communications …, 2012 - ieeexplore.ieee.org
One-way hash chains are a popular cryptographic technique used in many security
applications. In this paper, we present a two-tier one-way hash chain (TTOHC) protocol to …

[PDF][PDF] Study of stochastic and machine learning techniques for anomaly-based Web attack detection

CT Giménez - 2015 - e-archivo.uc3m.es
Este periodo doctoral ha sido un camino de gran aprendizaje. Un camino con sus picos,
valles, aventuras, obstáculos... todos ellos merecen ser vividos. Y es que una tesis no es …

[PDF][PDF] Analysis of Cookie Based Session Management in HTTP and Security Concerns

S Gupta - jkhighereducation.nic.in
Web-based applications often use cookies to maintain state in HTTP protocol. However the
uses of cookie have grown far beyond their original intention. Cookies are used to store …

Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains

A Alabrah - 2014 - stars.library.ucf.edu
In this dissertation, new approaches that utilize the one-way cryptographic hash functions in
designing improved network security protocols are investigated. The proposed approaches …

[PDF][PDF] Designing of Non-Static Web Session

P Noiumkar, T Chomsiri, K Kunkang… - Proceedings of 2011 1st …, 2011 - Citeseer
A large number of web sites, including e-commerce and famous websites such as Hotmail,
Gmail, Yahoo mail, Hi5, and Face-book, are vulnerable to Session Hijacking, whereby a …