Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

Enhancing malware analysis sandboxes with emulated user behavior

S Liu, P Feng, S Wang, K Sun, J Cao - Computers & Security, 2022 - Elsevier
Cybersecurity teams have widely used malware analysis sandboxes to investigate the threat
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …

“Saving Precious Seconds”—A novel approach to implementing a low-cost earthquake early warning system with node-level detection and alert generation

R Prasanna, C Chandrakumar, R Nandana, C Holden… - Informatics, 2022 - mdpi.com
This paper presents findings from ongoing research that explores the ability to use Micro-
Electromechanical Systems (MEMS)-based technologies and various digital communication …

Enhancing security with in-depth analysis of brute-force attack on secure hashing algorithms

R Verma, N Dhanda, V Nagar - Proceedings of Trends in Electronics and …, 2022 - Springer
Brute-force attack is considered one of the oldest attacks in the entire history of
cybersecurity. Amid the diverse cyberattacks, the brute-force technique or exhaustive search …

Where The Wild Things Are:{Brute-Force}{SSH} Attacks In The Wild And How To Stop Them

SK Singh, S Gautam, C Cartier, S Patil… - 21st USENIX Symposium …, 2024 - usenix.org
SSH (Secure Shell) is widely used for remote access to systems and cloud services. This
access comes with the persistent threat of SSH password-guessing brute-force attacks …

Fifteen Months in the Life of a Honeyfarm

C Munteanu, SJ Saidi, O Gasser… - Proceedings of the …, 2023 - dl.acm.org
Honeypots have been used for decades to detect, monitor, and understand attempts of
unauthorized use of information systems. Previous studies focused on characterizing the …

Taxonomy of fingerprinting techniques for evaluation of smart grid honeypot realism

V Tay, X Li, D Mashima, B Ng, P Cao… - … for Smart Grids …, 2023 - ieeexplore.ieee.org
Honeypots are a form of deception technology that provides an additional line of defense,
and is regarded as a cybersecurity application of digital twins in the smart grid domain. By …

{SocialHEISTing}: Understanding Stolen Facebook Accounts

J Onaolapo, N Leontiadis, D Magka… - 30th USENIX Security …, 2021 - usenix.org
Online social network (OSN) accounts are often more user-centric than other types of online
accounts (eg, email accounts) because they present a number of demographic attributes …

Realtime risk monitoring of SSH brute force attacks

G Fahrnberger - International conference on innovations for community …, 2022 - Springer
Abstract The Secure Shell (SSH) has served for years as the primary protocol to securely
control networked remote devices. In particular, administrators of Linux and, to an increasing …