Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems …
IN Fovino, A Carcano, M Masera… - International Journal of …, 2009 - Elsevier
Modern critical infrastructures are continually exposed to new threats due to the vulnerabilities and architectural weaknesses introduced by the extensive use of information …
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to their enormously adverse impact on the Internet. Thus …
Organizations are faced with a variety of information security threats and implement several information system security countermeasures (ISSCs) to mitigate possible damage due to …
The Real-Time Immersive Network Simulation Environment (RINSE) simulator is being developed to support large-scale network security preparedness and training exercises …
Y Elovici, G Tachan, A Shabtai - US Patent 8,171,554, 2012 - Google Patents
US8171554B2 - System that provides early detection, alert, and response to electronic threats - Google Patents US8171554B2 - System that provides early detection, alert, and response to …
G Gu, M Sharif, X Qin, D Dagon… - 20th Annual Computer …, 2004 - ieeexplore.ieee.org
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and …
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of …
This paper presents a novel architecture for 9/Discrete Wavelet Transform (DWT) based on Distributed Arithmetic (DA). The proposed architecture optimizes the performance by …