Sved: Scanning, vulnerabilities, exploits and detection

H Holm, T Sommestad - MILCOM 2016-2016 IEEE Military …, 2016 - ieeexplore.ieee.org
This paper presents the Scanning, Vulnerabilities, Exploits and Detection tool (SVED).
SVED facilitates reliable and repeatable cyber security experiments by providing a means to …

[PDF][PDF] Cyber red teaming: overview of sly, an orchestration tool

P de La Vallée, G Losifidis, W Mees - Information & Security, 2022 - connections-qj.org
The complexity of protecting interconnected IT systems grows with the development of new
products and applications. Consequently, the capability of Security Operation Centre …

Intrusion detection and prevention with machine learning algorithms

V Chang, S Boddu, QA Xu… - International Journal of …, 2023 - inderscienceonline.com
In recent decades, computer networks have played a key role in modern life and also have
escalated the number of new attacks on internet traffics to avoid malicious activities. An …

Modeling the owasp most critical web attacks

Y Ayachi, EH Ettifouri, J Berrich, B Toumi - Information Systems and …, 2019 - Springer
The tremendous growth of the web-based applications has increased information security
vulnerabilities over the Internet. The threat landscape of applications security is constantly …

Malware detection quality control

A Kulaga, N Balakin, N Grebennikov… - US Patent …, 2024 - Google Patents
A method of continuous development of an internal threat scan engine based on an iterative
quality assessment includes iteratively performing a dynamic assessment of a quality of a …

Modeling the OWASP Most Critical WEB Attacks

B Toumi - Information Systems and Technologies to Support …, 2018 - books.google.com
The tremendous growth of the web-based applications has increased information security
vulnerabilities over the Internet. The threat landscape of applications security is constantly …

[图书][B] A quantitative experimental study of the effectiveness of systems to identify network attackers

CR Handorf - 2016 - search.proquest.com
This study analyzed the meta-data collected from a honeypot that was run by the Federal
Bureau of Investigation for a period of 5 years. This analysis compared the use of existing …

[引用][C] Análisis de la eficiencia de los IDS open source Suricata y Snort en las PYMES

A Zambrano, F Guailacela - 2019