S Chow, B Abdel-Aziz, F Khan - US Patent 8,181,249, 2012 - Google Patents
Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more …
PCK Hung, MV Martin - 2006 Canadian Conference on …, 2006 - ieeexplore.ieee.org
Recent voice over Internet protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve sending …
WC Sun, YM Chen - Expert Systems with Applications, 2009 - Elsevier
In recent years, given their rapid propagations, Internet worms increasingly threaten the Internet hosts and services. It's worsen by the fact that zero-day polymorphic worms, which …
B Abdel-Aziz, S Chow, SL Chen - US Patent 8,341,740, 2012 - Google Patents
Enterprise networks are found in a variety of businesses, government agencies, academic institutions, and other orga nizations in which computer resources are shared and inter …
L Qi, M Vargas Martin, B Kapralos, M Green… - On the Move to …, 2007 - Springer
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by …
PCK Hung, MV Martin - Proceedings of the IADIS International Conference …, 2006 - Citeseer
ABSTRACT Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems …
Network intrusion detection has been generally dealt with sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by …
D Ivanchykhin, S Ignatchenko… - Software: Practice and …, 2017 - Wiley Online Library
Random hashing can provide guarantees regarding the performance of data structures such as hash tables–even in an adversarial setting. Many existing families of hash functions are …
S Kondakci - Security and communication networks, 2012 - Wiley Online Library
This paper presents a new concept for information security assessments while promoting several areas of its application. Threat generation, attack pattern analysis, quantitative risk …