Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Iterative Per Group Feature Selection For Intrusion Detection
Chkirbene, Zina, Erbad, Aiman, Hamila, Ridha, Gouissem, Ala, Mohamed, Amr, Guizani, Mohsen, Hamdi, Mounir
Published in International Wireless Communications and Mobile Computing Conference (Online) (01.06.2020)
Published in International Wireless Communications and Mobile Computing Conference (Online) (01.06.2020)
Get full text
Conference Proceeding
Loading…
Detecting lateral movement: A systematic survey
Smiliotopoulos, Christos, Kambourakis, Georgios, Kolias, Constantinos
Published in Heliyon (29.02.2024)
Published in Heliyon (29.02.2024)
Get full text
Journal Article
Loading…
Loading…
Identifying MMORPG Bots: A Traffic Analysis Approach
Chen, Kuan-Ta, Jiang, Jhih-Wei, Huang, Polly, Chu, Hao-Hua, Lei, Chin-Laung, Chen, Wen-Chin
Published in EURASIP journal on advances in signal processing (01.01.2009)
Published in EURASIP journal on advances in signal processing (01.01.2009)
Get full text
Journal Article
Loading…
Loading…
Context Data Acquisition Using Adaptive Non-repudiation Model
Tunia, Marcin Alan
Published in International Journal of Electronics and Telecommunications (01.01.2018)
Published in International Journal of Electronics and Telecommunications (01.01.2018)
Get full text
Journal Article
Loading…
Loading…
Loading…
Exploiting Dynamic Reconfiguration for FPGA Based Network Intrusion Detection Systems
Pontarelli, S, Greco, C, Nobile, E, Teofili, S, Bianchi, G
Published in 2010 International Conference on Field Programmable Logic and Applications (01.08.2010)
Published in 2010 International Conference on Field Programmable Logic and Applications (01.08.2010)
Get full text
Conference Proceeding
Loading…
Secure Multiparty Computation: From Millionaires Problem to Anonymizer
Sheikh, Rashid, Mishra, Durgesh Kumar, Kumar, Beerendra
Published in Information systems security (01.01.2011)
Get full text
Published in Information systems security (01.01.2011)
Journal Article
Loading…
Early Detection of Network Attacks Using Deep Learning
Ahmad, Tanwir, Truscan, Dragos, Vain, Juri, Porres, Ivan
Published in 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01.04.2022)
Published in 2022 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01.04.2022)
Get full text
Conference Proceeding
Loading…