X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to detect security threats and measure the security of the Internet arises a significant research …
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system …
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks …
A Wang, W Chang, S Chen… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend against, partially due to the volatility of the attacking methods and patterns used by attackers …
A Bose, X Hu, KG Shin, T Park - … of the 6th international conference on …, 2008 - dl.acm.org
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile …
BK Mishra, N Jha - Applied Mathematical Modelling, 2010 - Elsevier
Susceptible (S)–exposed (E)–infectious (I)–quarantined (Q)–recovered (R) model for the transmission of malicious objects in computer network is formulated. Thresholds, equilibria …
Most of the security threats in various communications networks are posed by the illegitimate entities that enter or intrude within the network perimeter, which could commonly be termed …
BK Mishra, SK Pandey - Applied mathematics and computation, 2011 - Elsevier
An e-epidemic SEIRS model for the transmission of worms in computer network through vertical transmission is formulated. It has been observed that if the basic reproduction …
C Fachkha, M Debbabi - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Today, the Internet security community largely emphasizes cyberspace monitoring for the purpose of generating cyber intelligence. In this paper, we present a survey on darknet. The …