Software birthmark design and estimation: a systematic literature review

S Nazir, S Shahzad, N Mukhtar - Arabian Journal for Science and …, 2019 - Springer
The concept of software birthmark is developed for the detection of theft and piracy in
software applications. The originality of software can be evaluated by comparing software …

5gfiver: Functional integrity verification for 5G cloud-native network functions

ASM Asadujjaman, ME Kabir, H Purohit… - … on Cloud Computing …, 2022 - ieeexplore.ieee.org
5G networks attain a better performance along with a reduction in cost by cloudifying its
network functions as Cloud+ native Network Functions (CNFs). However, CNF may …

Integrity Verification for Virtualized Networks Using Side-Channel

ASM Asadujjaman - 2023 - spectrum.library.concordia.ca
Virtualization of networks has recently attracted enormous interest as an enabler of high-
performance, cost-effective, scalable, and reliable communication services (eg, 5G) …

Detection of zeus bot based on host and network activities

R Kalpika, AR Vasudevan - … , SSCC 2017, Manipal, India, September 13 …, 2017 - Springer
Botnet is a network of host machines infected by malicious code. Infected machines are bots
that perform illegitimate activities with the help of bot master who has remote control over the …

Segmentation and dynamic expansion of IDS rulesets

T Bannikere Eshwarappa - 2024 - diva-portal.org
This research explores an innovative approach to managing extensive rulesets in Host
Intrusion Detection Systems (HIDS) through segmentation and dynamic expansion. Drawing …

Performance improvements in behavior based malware detection solutions

G Hăjmăşan, A Mondoc, R Portase, O Creţ - IFIP International Conference …, 2018 - Springer
The constant evolution of malware, both in number and complexity, represents a severe
threat to individual users and organizations. This is increasing the need for more advanced …

AI-Powered Detection and Prevention Tool to Secure APIs from Malicious Bot Attacks

C Dinuwan, H Amandakoon, I Aberathne… - … Conference on Smart …, 2023 - Springer
Abstract The Application Programming Interface (API) has become the primary method for
integrating different software systems. Malicious bots have recently become the main cyber …

Bots Impact On Online Surveys Within Special Education Research

C Deheck - 2023 - ir.vanderbilt.edu
Researchers use online surveys to collect data from diverse populations (Phillips, 2017;
Simone, 2019a). With the use of online surveys comes the potential for Artificial Intelligence …

High-Performance Graph Computing and Application in Cybersecurity

Y Ji - 2021 - search.proquest.com
Graph is a natural representation for many real-world applications, such as road map,
protein-protein interaction network, and code graph. The graph algorithms can help mine …

[图书][B] Zero-Day Defense: Discovering and Removing Vulnerabilities throughProgram Customization and Fuzzing

Y Chen - 2020 - search.proquest.com
A zero-day attack happens when attackers exploit a cyber vulnerability that is unknown to
the public. It has been reported that 15% of the exploits occur before the disclosure of …