A learning-based approach to the detection of SQL attacks

F Valeur, D Mutz, G Vigna - Detection of Intrusions and Malware, and …, 2005 - Springer
Web-based systems are often a composition of infrastructure components, such as web
servers and databases, and of application-specific code, such as HTML-embedded scripts …

A multi-model approach to the detection of web-based attacks

C Kruegel, G Vigna, W Robertson - Computer Networks, 2005 - Elsevier
Web-based vulnerabilities represent a substantial portion of the security exposures of
computer networks. In order to detect known web-based attacks, misuse detection systems …

An experimental investigation of malware attacks on SCADA systems

IN Fovino, A Carcano, M Masera… - International Journal of …, 2009 - Elsevier
Modern critical infrastructures are continually exposed to new threats due to the
vulnerabilities and architectural weaknesses introduced by the extensive use of information …

Modeling and automated containment of worms

SH Sellke, NB Shroff, S Bagchi - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have
drawn significant attention due to their enormously adverse impact on the Internet. Thus …

Understanding the value of countermeasure portfolios in information systems security

RL Kumar, S Park, C Subramaniam - Journal of Management …, 2008 - Taylor & Francis
Organizations are faced with a variety of information security threats and implement several
information system security countermeasures (ISSCs) to mitigate possible damage due to …

Rinse: The real-time immersive network simulation environment for network security exercises (extended version)

M Liljenstam, J Liu, DM Nicol, Y Yuan, G Yan… - …, 2006 - journals.sagepub.com
The Real-Time Immersive Network Simulation Environment (RINSE) simulator is being
developed to support large-scale network security preparedness and training exercises …

System that provides early detection, alert, and response to electronic threats

Y Elovici, G Tachan, A Shabtai - US Patent 8,171,554, 2012 - Google Patents
US8171554B2 - System that provides early detection, alert, and response to electronic threats
- Google Patents US8171554B2 - System that provides early detection, alert, and response to …

Worm detection, early warning and response based on local victim information

G Gu, M Sharif, X Qin, D Dagon… - 20th Annual Computer …, 2004 - ieeexplore.ieee.org
Worm detection systems have traditionally focused on global strategies. In the absence of a
global worm detection system, we examine the effectiveness of local worm detection and …

PLC security and critical infrastructure protection

GPH Sandaruwan, PS Ranaweera… - 2013 IEEE 8th …, 2013 - ieeexplore.ieee.org
Programmable Logic Controllers (PLCs) are the most important components embedded in
Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of …

Efficient distributed arithmetic based DWT architecture for multimedia applications

M Alam, CA Rahman, W Badawy… - The 3rd IEEE …, 2003 - ieeexplore.ieee.org
This paper presents a novel architecture for 9/Discrete Wavelet Transform (DWT) based on
Distributed Arithmetic (DA). The proposed architecture optimizes the performance by …