A Singh - US Patent 10,581,898, 2020 - Google Patents
A computerized technique is provided to analyze a message for malware by determining context information from attributes of the message. The attributes are determined by …
Y Sun, X Chen - Journal of Physics: Conference Series, 2020 - iopscience.iop.org
This paper introduces different approaches to intrusion detection system (IDS) alert aggregation and proposes an improved frequent pattern growth (FP-growth) algorithm for it …
SJ Yang, A Okutan, G Werner, SH Su, A Goel… - arXiv preprint arXiv …, 2021 - arxiv.org
Critical and sophisticated cyberattacks often take multitudes of reconnaissance, exploitations, and obfuscation techniques to penetrate through well protected enterprise …
Информатика и компьютерные технологии ных сервисов и экономическая выгода. Новая па радигма построения вычислительных систем, связанная с разделением …
UNIVERSITÀ DI PISA Laurea Triennale in Informatica Analysis of network traffic on the public network through a honeypot Page 1 UNIVERSITÀ DI PISA DIPARTIMENTO DI …