Loading…
Loading…
Loading…
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC
Shah, Ankit, Ganesan, Rajesh, Jajodia, Sushil, Cam, Hasan
Published in IEEE transactions on information forensics and security (01.07.2019)
Published in IEEE transactions on information forensics and security (01.07.2019)
Get full text
Journal Article
Loading…
False Positive Identification in Intrusion Detection Using XAI
Da Silveira Lopes, Ricardo, Duarte, Julio Cesar, Goldschmidt, Ronaldo Ribeiro
Published in Revista IEEE América Latina (01.06.2023)
Published in Revista IEEE América Latina (01.06.2023)
Get full text
Journal Article
Loading…
A Blockchain Approach to Identifying Compromised Nodes in Collaborative Intrusion Detection Systems
Yenugunti, Chandralekha, Yau, Stephen S.
Published in 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (01.08.2020)
Published in 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (01.08.2020)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
An Enhancement Method in Few-Shot Scenarios for Intrusion Detection in Smart Home Environments
Chen, Yajun, Wang, Junxiang, Yang, Tao, Li, Qinru, Nijhum, Nahian Alom
Published in Electronics (Basel) (01.08.2023)
Published in Electronics (Basel) (01.08.2023)
Get full text
Journal Article
Loading…
Loading…
A Multi-Layered Defence Strategy against DDoS Attacks in SDN/NFV-Based 5G Mobile Networks
Sheibani, Morteza, Konur, Savas, Awan, Irfan, Qureshi, Amna
Published in Electronics (Basel) (01.04.2024)
Published in Electronics (Basel) (01.04.2024)
Get full text
Journal Article
Loading…
Deep Learning Approaches for Predictive Masquerade Detection
Elmasry, Wisam, Zaim, Abdul Halim, Akbulut, Akhan
Published in Security and communication networks (01.01.2018)
Published in Security and communication networks (01.01.2018)
Get full text
Journal Article
Loading…
Loading…
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
Lin, Fuhong, An, Xingshuo, Xu, Shenggang, Miao, Li, Gong, Chao
Published in Security and communication networks (01.01.2018)
Published in Security and communication networks (01.01.2018)
Get full text
Journal Article
Loading…
Loading…
Loading…
Performance evaluation of anomaly-detection algorithms for mouse dynamics
Shen, Chao, Cai, Zhongmin, Guan, Xiaohong, Maxion, Roy
Published in Computers & security (01.09.2014)
Published in Computers & security (01.09.2014)
Get full text
Journal Article
Loading…
Loading…
Cryptography and Its Applications in Information Security
Year of Publication 2022
Get full text
eBook