Adapting modern approaches for network intrusion detection is becoming critical, given the rapid technological advancement and adversarial attack rates. Therefore, packet-based …
In order to counter cyber-attacks and digital threats, security experts must generate, share, and exploit cyber-threat intelligence generated from malware. In this research, we address …
Attacks launched over the Internet often degrade or disrupt the quality of online services. Various Intrusion Detection Systems (IDSs), with or without prevention capabilities, have …
Banking malware are malicious programs that attempt to steal confidential information, such as banking authentication credentials, from users. Zeus is one of the most widespread …
HMJ Alfouadi, NMN Saeea, NAF Neamah - Wasit Journal of Computer and …, 2023 - iasj.net
Intrusion detection systems are management programs that detect possible attacks on networks and computers, and usually do so by identifying information in the header of …
Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and …
E El-Araby, I Gonzalez… - 2008 Second International …, 2008 - ieeexplore.ieee.org
High-performance reconfigurable computers (HPRCs) are parallel computers but with added FPGA chips. Examples of such systems are the Cray XT5 h and Cray XD1, the SRC-7 …
H Alizadeh, A Khoshrou… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
This paper presents the use of unsupervised Gaussian Mixture Models (GMMs) for the production of per-application models using their flows' statistics in order to be exploited in …
R Mishra, SK Jha - Internet of Things and Its Applications: Select …, 2022 - Springer
Due to unpleasant market competition, IT companies are releasing the software or applications without much considering the unintended security breaches presented inside it …