Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 5231 results
Sort by: relevance publication year

Network Attack Detection and Mitigation

PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops

Authors: Sangita Roy | Ashok Singh Sairam

XSS Vulnerability Detection Using Optimized Attack Vector Repertory

PROCEEDINGS ARTICLE published September 2015 in 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

Authors: Xiaobing Guo | Shuyuan Jin | Yaxing Zhang

Secure Routing Architectures Using Cross-Layer Information for Attack Avoidance (with Case Study on Wormhole Attacks)

BOOK CHAPTER published 19 April 2016 in Security of Self-Organizing Networks

A detection mechanism of DoS attack using adaptive NSA algorithm in cloud environment

PROCEEDINGS ARTICLE published December 2015 in 2015 International Conference on Computing, Communication and Security (ICCCS)

Authors: Sumana Maiti | Chandan Garai | Ranjan Dasgupta

Sybil Attack in VANETs: Detection and Prevention

BOOK CHAPTER published 19 April 2016 in Security of Self-Organizing Networks

Guarding web application with multi - Angled attack detection

PROCEEDINGS ARTICLE published February 2015 in 2015 International Conference on Soft-Computing and Networks Security (ICSNS)

Authors: J.Jemi Hazel | P. Valarmathie | R. Saravanan

DDOS Attack Detection and Mitigation Technique Based on Http Count and Verification Using CAPTCHA

PROCEEDINGS ARTICLE published January 2015 in 2015 International Conference on Computational Intelligence and Networks

Authors: Khundrakpam Johnson Singh | Tanmay De

CINDAM: Customized Information Networks for Deception and Attack Mitigation

PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops

Authors: Seth Robertson | Scott Alexander | Josephine Micallef | Jonathan Pucci | James Tanis | Anthony Macera

A XSS Vulnerability Detection Approach Based on Simulating Browser Behavior

PROCEEDINGS ARTICLE published December 2015 in 2015 2nd International Conference on Information Science and Security (ICISS)

Authors: Yuan Liu | Wenbing Zhao | Dan Wang | Lihua Fu

Multi-step Attack Pattern Detection on Normalized Event Logs

PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing

Authors: David Jaeger | Martin Ussath | Feng Cheng | Christoph Meinel

Attack detection and mitigation using optimal deep maxout network in cloud computing

JOURNAL ARTICLE published September 2022 in International Journal of Adaptive Control and Signal Processing

Authors: Shubangini Patil | Rekha Patil

Physical Layer Security in Cognitive Radio Networks: Detection and Mitigation of Primary User Emulation Attacks

PROCEEDINGS ARTICLE published 7 January 2015 in International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015) Jan. 7-8, 2015 Dubai (UAE)

Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming

PROCEEDINGS ARTICLE published December 2014 in 2015 IEEE Global Communications Conference (GLOBECOM)

Authors: Rashad Eletreby | Hanif Rahbari | Marwan Krunz

Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming

PROCEEDINGS ARTICLE published December 2015 in 2015 IEEE Global Communications Conference (GLOBECOM)

Authors: Rashad Eletreby | Hanif Rahbari | Marwan Krunz

DDoS Attack Detection Using Flow Entropy and Clustering Technique

PROCEEDINGS ARTICLE published December 2015 in 2015 11th International Conference on Computational Intelligence and Security (CIS)

Authors: Xi Qin | Tongge Xu | Chao Wang

Preventing Black Hole Attack in AODV using timer-based detection mechanism

PROCEEDINGS ARTICLE published January 2015 in 2015 International Conference on Signal Processing and Communication Engineering Systems

Authors: Nidhi Choudhary | Lokesh Tharani

Cross Layer Anomaly Based Intrusion Detection System

PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops

Authors: Pratik Satam

Continuous monitoring methods as a mechanism for detection and mitigation of growing threats in banking security system

PROCEEDINGS ARTICLE published December 2015 in 2015 4th International Conference on Interactive Digital Media (ICIDM)

Authors: Bright Gameli Mawudor | Myong-Hee Kim | Man-Gon Park

A Novel Approach of Detection and Mitigation of DDOS Attack

PROCEEDINGS ARTICLE published 20 April 2015 in International Institute of Engineers April 20-21, 2015 Bangkok (Thailand)

Mitigation of byzantine attack using enhanced cooperative bait detection and prevention scheme (ECBDPS)

PROCEEDINGS ARTICLE published September 2015 in 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)

Authors: Renu Sharma | Jitender Grover