Review of signature-based techniques in antivirus products

M Al-Asli, TA Ghaleb - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Existing antivirus products employ diverse types of techniques to detect malware or any
suspicious activities. The majority of such techniques rely on signature-based detection …

A model-based validated autonomic approach to self-protect computing systems

Q Chen, S Abdelwahed, A Erradi - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
This paper introduces an autonomic model-based cyber security management approach for
the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …

Toward realizing self-protecting healthcare information systems: Design and security challenges

Q Chen - Advances in Computers, 2019 - Elsevier
This book chapter reviews the history of Healthcare Information Systems (HISs), discusses
recent cyber security threats affecting HISs, and then introduces the autonomic computing …

DHSWM: 一种改进的WM 多模式匹配算法

刘卫国, 胡勇刚 - 中南大学学报: 自然科学版, 2011 - cqvip.com
针对WM 算法的查找效率随着模式集规模的增大而降低的问题, 提出一种改进算法.
在预处理阶段, 改变原有Hash 表中的链表结构, 采用双哈希法将模式串存放在Hash1 …

Shift-based pattern matching for compressed web traffic

A Bremler-Barr, Y Koral, V Zigdon - 2011 IEEE 12th …, 2011 - ieeexplore.ieee.org
Compressing web traffic using standard GZIP is becoming both popular and challenging
due to the huge increase in wireless web devices, where bandwidth is limited. Security and …

Online algorithms for finding distinct substrings with length and multiple prefix and suffix conditions

L Leonard, S Inenaga, H Bannai, T Mieno - International Symposium on …, 2022 - Springer
Let two static sequences of strings P and S, representing prefix and suffix conditions
respectively, be given as input for preprocessing. For the query, let two positive integers k 1 …

结合遗传算法的NIDS 多媒体包多线程择危模型

赵旭, 王伟 - 计算机工程与应用, 2016 - cqvip.com
当网络流量超出网络入侵检测系统(NIDS) 负载能力时, 漏检将不可避免, 此时应选择较危险的
数据包优先处理. 因多媒体数据包在流量中所占比例较大, 故曾提出对其识别和特殊处理的方法 …

Multi-threading and suffix grouping on massive multiple pattern matching algorithm

D Oh, WW Ro - The Computer Journal, 2012 - academic.oup.com
The widely used multiple pattern matching algorithms experience severe performance
degradation when the number of patterns to match increases. In light of this fact, this paper …

[PDF][PDF] AComprehensive STUDY ON CLASSIFICATION OF PASSIVE INTRUSION AND EXTRUSION DETECTION SYSTEM

MJ Lekha, G Padmavathi, DC Wyld - ICCSEA, SPPR, CSIA, WimoA-2013 …, 2013 - csitcp.com
ABSTRACT Cyber criminals compromise Integrity, Availability and Confidentiality of network
resources in cyber space and cause remote class intrusions such as U2R, R2L, DoS and …

ADVANCES IN MALWARE DETECTION APPROACHES USING MACHINE AND DEEP LEARNING

P Dwivedi, CS Raghuvanshi, HO Sharan - RES MILITARIS, 2023 - resmilitaris.net
Many institutions have suffered significant financial losses as a result of malware's rapid
growth over the previous decade, according to studies. Anti-malware businesses have come …