Facet browsing currently unavailable
Page 1 of 4825 results
Sort by: relevance publication year
XSS Vulnerability Detection Using Optimized Attack Vector Repertory PROCEEDINGS ARTICLE published September 2015 in 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery |
A detection mechanism of DoS attack using adaptive NSA algorithm in cloud environment PROCEEDINGS ARTICLE published December 2015 in 2015 International Conference on Computing, Communication and Security (ICCCS) |
Guarding web application with multi - Angled attack detection PROCEEDINGS ARTICLE published February 2015 in 2015 International Conference on Soft-Computing and Networks Security (ICSNS) |
DDOS Attack Detection and Mitigation Technique Based on Http Count and Verification Using CAPTCHA PROCEEDINGS ARTICLE published January 2015 in 2015 International Conference on Computational Intelligence and Networks |
A XSS Vulnerability Detection Approach Based on Simulating Browser Behavior PROCEEDINGS ARTICLE published December 2015 in 2015 2nd International Conference on Information Science and Security (ICISS) |
Multi-step Attack Pattern Detection on Normalized Event Logs PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing |
Physical Layer Security in Cognitive Radio Networks: Detection and Mitigation of Primary User Emulation Attacks PROCEEDINGS ARTICLE published 7 January 2015 in International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015) Jan. 7-8, 2015 Dubai (UAE) |
Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming PROCEEDINGS ARTICLE published December 2014 in 2015 IEEE Global Communications Conference (GLOBECOM) |
Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming PROCEEDINGS ARTICLE published December 2015 in 2015 IEEE Global Communications Conference (GLOBECOM) |
DDoS Attack Detection Using Flow Entropy and Clustering Technique PROCEEDINGS ARTICLE published December 2015 in 2015 11th International Conference on Computational Intelligence and Security (CIS) |
Preventing Black Hole Attack in AODV using timer-based detection mechanism PROCEEDINGS ARTICLE published January 2015 in 2015 International Conference on Signal Processing and Communication Engineering Systems |
Continuous monitoring methods as a mechanism for detection and mitigation of growing threats in banking security system PROCEEDINGS ARTICLE published December 2015 in 2015 4th International Conference on Interactive Digital Media (ICIDM) |
A Novel Approach of Detection and Mitigation of DDOS Attack PROCEEDINGS ARTICLE published 20 April 2015 in International Institute of Engineers April 20-21, 2015 Bangkok (Thailand) |
Mitigation of byzantine attack using enhanced cooperative bait detection and prevention scheme (ECBDPS) PROCEEDINGS ARTICLE published September 2015 in 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions) |
Network Attack Detection and Mitigation PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops |
MAD: A Middleware Framework for Multi-step Attack Detection PROCEEDINGS ARTICLE published November 2015 in 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) |
Deep Representation Learning for Cyber-Attack Detection in Industrial IoT BOOK CHAPTER published 2021 in AI-Enabled Threat Detection and Security Analysis for Industrial IoT |
MLDED: Multi-layer Data Exfiltration Detection System PROCEEDINGS ARTICLE published October 2015 in 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec) |
Joint Self-Interference Mitigation and Physical-Layer Security Enhancement for Full Duplex Communications PROCEEDINGS ARTICLE published December 2015 in 2015 IEEE Global Communications Conference (GLOBECOM) |
Joint Self-Interference Mitigation and Physical-Layer Security Enhancement for Full Duplex Communications PROCEEDINGS ARTICLE published December 2014 in 2015 IEEE Global Communications Conference (GLOBECOM) |