暂无分享,去创建一个
Lorena Isabel Barona López | Ángel Leonardo Valdivieso Caraguay | Pablo Daniel Marcillo Lara | Daniel Alejandro Maldonado-Ruiz | Santiago Daniel Arrais Díaz | D. Maldonado-Ruiz
[1] Manoj Kumar,et al. Visual Cryptography: A Literature Survey , 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA).
[2] Syed Akram,et al. Survey on usable and secure two-factor authentication , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[3] Chirag N. Modi,et al. Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review , 2017, The Journal of Supercomputing.
[4] Sreela Sreedhar,et al. An improved secret sharing using XOR-based Visual Cryptography , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).
[5] Fang-Yie Leu,et al. Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[6] Nikil Dutt,et al. Special session: trends, challenges and needs for lattice-based cryptography implementations , 2017, 2017 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[7] Steve Mansfield-Devine. Weaponising the Internet of Things , 2017, Netw. Secur..
[8] Anurag Jain,et al. An Improved Method to Detect Intrusion Using Machine Learning Algorithms , 2016 .
[9] Ján Hurtuk,et al. Safe user authentication in a network environment , 2017, 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI).
[10] Michael Backes,et al. Linking Amplification DDoS Attacks to Booter Services , 2017, RAID.
[11] Scott Hazelhurst,et al. NFShunt: A Linux firewall with OpenFlow-enabled hardware bypass , 2015, 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN).
[12] Tsai-Hua Kang,et al. Random graphic user password authentication scheme in mobile devices , 2017, 2017 International Conference on Applied System Innovation (ICASI).
[13] Peng Zhang,et al. Collaborative network security in multi-tenant data center for cloud computing , 2014 .
[14] Huashan Chen,et al. Quantifying the security effectiveness of firewalls and DMZs , 2018, HotSoS.
[15] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[16] Dongsu Han,et al. DFC: Accelerating String Pattern Matching for Network Applications , 2016, NSDI.
[17] Francesco Palmieri,et al. Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks , 2017, IEEE Systems Journal.
[18] D.W.Y.O. Waidyarathna,et al. Intrusion Detection System with Correlation Engine and Vulnerability Assessment , 2018 .
[19] Zubair A. Baig,et al. Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services , 2017, J. Netw. Comput. Appl..
[20] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[21] Jan Medved,et al. OpenDaylight: Towards a Model-Driven SDN Controller architecture , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[22] Pritam Gajkumar Shah,et al. Revisting of elliptical curve cryptography for securing Internet of Things (IOT) , 2018, 2018 Advances in Science and Engineering Technology International Conferences (ASET).
[23] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[24] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[25] Ming Jiang,et al. Two-Way Graphic Password for Mobile User Authentication , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[26] D. Gauthier,et al. High-dimensional quantum cryptography with twisted light , 2014, 1402.7113.
[27] Pramod Kumar,et al. Remote User Authentication Scheme: A Comparative Analysis and Improved Behavioral Biometrics Based Authentication Scheme , 2016, 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).
[28] George M. Mohay,et al. IDS Interoperability and Correlation Using IDMEF and Commodity Systems , 2002, ICICS.
[29] D. Guan,et al. ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL , 2016 .
[30] Mauro Conti,et al. SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks , 2017, IEEE Transactions on Network and Service Management.
[31] Abdelkader H. Ouda,et al. A hybrid-based filtering approach for user authentication , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[32] Ainuddin Wahid Abdul Wahab,et al. Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing , 2018 .
[33] Abhishek Javali,et al. Quantum cryptography for IoT: APerspective , 2017, 2017 International Conference on IoT and Application (ICIOT).
[34] Stuart Harvey Rubin,et al. Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[35] Wesley M. Eddy,et al. TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.
[36] Rojalina Priyadarshini,et al. An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).
[37] Yang Li,et al. Performance Analysis of Honeypot with Petri Nets , 2018, Inf..
[38] Chirag Sheth,et al. Performance Evaluation and Comparative Analysis of Network Firewalls , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[39] Reihaneh Safavi-Naini,et al. Reconciling user privacy and implicit authentication for mobile devices , 2015, Comput. Secur..
[40] Sazzad Hossain,et al. Generation of one-time keys for single line authentication , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[41] M. Hemanth Kumar,et al. Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks , 2019 .
[42] D. P. Gaikwad,et al. Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA , 2016, 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT).
[43] Aiko Pras,et al. Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire? , 2017, J. Inf. Commun. Ethics Soc..
[44] Jie Wang,et al. An authentication method based on user specific behavior , 2016, 2016 5th International Conference on Computer Science and Network Technology (ICCSNT).
[45] Mihir Bellare,et al. Robust Encryption , 2010, TCC.
[46] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[47] S. B. Somani,et al. Biometric user authentication using brain waves , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).
[48] Omer Reingold,et al. Incremental Deterministic Public-Key Encryption , 2012, EUROCRYPT.
[49] Steven Furnell,et al. Continuous user authentication using multi-modal biometrics , 2015, Comput. Secur..
[50] Stefan C. Kremer,et al. Network intrusion detection system based on recursive feature addition and bigram technique , 2018, Comput. Secur..
[51] C. Chellappan,et al. Efficient SYN Spoofing Detection and Mitigation Scheme for DDoS Attack , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).
[52] Abdelkader Ouda. A framework for next generation user authentication , 2016, 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).
[53] G. Murali,et al. Comparison of classical and quantum cryptography using QKD simulator , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
[54] Eiichiro Fujisaki,et al. All-But-Many Encryption , 2017, Journal of Cryptology.
[55] Matthew Smith,et al. You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores , 2014, Financial Cryptography.
[56] Ilan Komargodski,et al. Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions , 2015, TCC.
[57] Gil Segev,et al. Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions , 2013, EUROCRYPT.
[58] Subhradeep Biswas,et al. Password security system with 2-way authentication , 2017, 2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).