DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks

HA Kholidy, F Baiardi, S Hariri - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
A masquerade attacker impersonates a legal user to utilize the user services and privileges.
The semi-global alignment algorithm (SGA) is one of the most effective and efficient …

Fuzzy approach for intrusion detection based on user's commands

P Kudłacik, P Porwik, T Wesołowski - Soft Computing, 2016 - Springer
The article concerns the problem of detecting masqueraders in computer systems. A
masquerader in a computer system is an intruder who pretends to be a legitimate user in …

Ca-NIDS: A network intrusion detection system using combinatorial algorithm approach

O Folorunso, FE Ayo, YE Babalola - Journal of Information Privacy …, 2016 - Taylor & Francis
ABSTRACT A signature-based system (SBS) is a common approach for intrusion detection
and the most preferable by researchers. In spite of the popularity of SBS, it cannot detect …

A conceptual hybrid model of deep convolutional neural network (dcnn) and long short-term memory (lstm) for masquerade attack detection

AA Azeezat, OS Adebukola, AA Adebayo… - … and Applications: Third …, 2021 - Springer
Over the years, different issues keep emanating in the area of computer security, ranging
from hacking to other security issues such as Ransomware, Distributed Denial of Service …

Japanese startup reinvents the wheelchair [News]

T Harbert - IEEE Spectrum, 2015 - ieeexplore.ieee.org
A Japanese startup founded by former automotive engineers wants to turn the wheelchair
into an accessory for the tech savvy. Their company, Whill, is building a" personal mobility …

A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LSTM) for Masquerade Attack Detection

OB Olushola - … Third International Conference, ICTA 2020, Minna …, 2021 - books.google.com
Over the years, different issues keep emanating in the area of computer security, ranging
from hacking to other security issues such as Ransomware, Distributed Denial of Service …

Command and Block Profiles for Legitimate Users of a Computer Network

AM Bartkowiak - … Information Systems–Analysis and Technologies: 10th …, 2011 - Springer
Intruders and masqueraders are a plague in computer networks. To recognize an intruder,
one firstly needs to know what is the normal behavior of a legitimate user. To find it out, we …

Sequence‐based masquerade detection for different user groups

S Sen - Security and Communication Networks, 2015 - Wiley Online Library
Insider threats are one of the biggest threats that organizations are confronted with today. A
masquerader who impersonates another user for his malicious activities has been studied …

[PDF][PDF] A Secure Scheme for Detecting Provenance Forgery and DDSGA for Detecting Masquerade Attacks in Wireless Sensor Networks

R Thiyagarajan, A Priyadharshini, B Meenakshipriya… - starresearchjournal.com
The sensor networks are popoularly increasing and it used as a effective way in decision
making infrastructures such as Data Acquisition systems, Supervisory Control industrial …

[PDF][PDF] INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DETERMINING FALSE ATTACKS USING DDSGA TECHNIQUE

R Fatima, M Shafiuddin - academia.edu
For the sake of identifying masquerade attackers in a computer, various alignment
algorithms has been proposed. The semi-global alignment algorithm (SGA) is the most …