A Taxonomy of Malicious Traffic for Intrusion Detection Systems
暂无分享,去创建一个
Robert C. Atkinson | Hanan Hindy | Ethan Bayne | Xavier J. A. Bellekens | Amar Seeam | Elike Hodo | Robert C. Atkinson | A. Seeam | X. Bellekens | Hanan Hindy | Elike Hodo | Ethan Bayne | Robert C. Atkinson
[1] Robert C. Atkinson,et al. Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey , 2017, ArXiv.
[2] Norman Wilde,et al. Preventing unauthorized islanding: cyber-threat analysis , 2006, 2006 IEEE/SMC International Conference on System of Systems Engineering.
[3] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[4] Jugal K. Kalita,et al. Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..
[5] Hannes Holm. Performance of automated network vulnerability scanning at remediating security issues , 2012, Comput. Secur..
[6] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[7] Levente Buttyán,et al. Embedded systems security: Threats, vulnerabilities, and attack taxonomy , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[8] Alessandro Orso,et al. A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.
[9] S. Shankar Sastry,et al. A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[10] R. Sunitha,et al. DATA-PROVENANCE VERIFICATION FOR SECURE HOSTS , 2013 .
[11] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[12] Karl N. Levitt,et al. Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[13] Philip A. Legg. Visual Analytics for Non-Expert Users in Cyber Situation Awareness , 2016, Int. J. Cyber Situational Aware..
[14] Travis Boraten,et al. Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs , 2018, J. Parallel Distributed Comput..
[15] Robert C. Atkinson,et al. GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing , 2014, SIN.
[16] Tyler Wrightson,et al. Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization , 2014 .
[17] Kamila Nieradzinska,et al. A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices , 2016, Int. J. Cyber Situational Aware..
[18] Hossain Shahriar,et al. Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications , 2016, Int. J. Secur. Softw. Eng..
[19] Pierre-Francois Marteau,et al. Sequence Covering for Efficient Host-Based Intrusion Detection , 2017, IEEE Transactions on Information Forensics and Security.
[20] Kris Mikael Krister. Automated Analyses of Malicious Code , 2009 .
[21] Farinaz Koushanfar. Trusting the open latent IC backdoors , 2011, STC '11.
[22] Poonam Verma,et al. Graphical Password Using an Intuitive Approach , 2018 .
[23] Franco Callegati,et al. Man-in-the-Middle Attack to the HTTPS Protocol , 2009, IEEE Security & Privacy Magazine.
[24] Robert C. Atkinson,et al. Machine Learning Approach for Detection of nonTor Traffic , 2017, ARES.
[25] bellekens xavier,et al. Cyber-Physical-Security Model for Safety-Critical IoT Infrastructures , 2015 .
[26] G. Manimaran,et al. Internet infrastructure security: a taxonomy , 2002, IEEE Netw..