Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 4825 results
Sort by: relevance publication year

XSS Vulnerability Detection Using Optimized Attack Vector Repertory

PROCEEDINGS ARTICLE published September 2015 in 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

Authors: Xiaobing Guo | Shuyuan Jin | Yaxing Zhang

A detection mechanism of DoS attack using adaptive NSA algorithm in cloud environment

PROCEEDINGS ARTICLE published December 2015 in 2015 International Conference on Computing, Communication and Security (ICCCS)

Authors: Sumana Maiti | Chandan Garai | Ranjan Dasgupta

Guarding web application with multi - Angled attack detection

PROCEEDINGS ARTICLE published February 2015 in 2015 International Conference on Soft-Computing and Networks Security (ICSNS)

Authors: J.Jemi Hazel | P. Valarmathie | R. Saravanan

DDOS Attack Detection and Mitigation Technique Based on Http Count and Verification Using CAPTCHA

PROCEEDINGS ARTICLE published January 2015 in 2015 International Conference on Computational Intelligence and Networks

Authors: Khundrakpam Johnson Singh | Tanmay De

A XSS Vulnerability Detection Approach Based on Simulating Browser Behavior

PROCEEDINGS ARTICLE published December 2015 in 2015 2nd International Conference on Information Science and Security (ICISS)

Authors: Yuan Liu | Wenbing Zhao | Dan Wang | Lihua Fu

Multi-step Attack Pattern Detection on Normalized Event Logs

PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing

Authors: David Jaeger | Martin Ussath | Feng Cheng | Christoph Meinel

Physical Layer Security in Cognitive Radio Networks: Detection and Mitigation of Primary User Emulation Attacks

PROCEEDINGS ARTICLE published 7 January 2015 in International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015) Jan. 7-8, 2015 Dubai (UAE)

Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming

PROCEEDINGS ARTICLE published December 2014 in 2015 IEEE Global Communications Conference (GLOBECOM)

Authors: Rashad Eletreby | Hanif Rahbari | Marwan Krunz

Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming

PROCEEDINGS ARTICLE published December 2015 in 2015 IEEE Global Communications Conference (GLOBECOM)

Authors: Rashad Eletreby | Hanif Rahbari | Marwan Krunz

DDoS Attack Detection Using Flow Entropy and Clustering Technique

PROCEEDINGS ARTICLE published December 2015 in 2015 11th International Conference on Computational Intelligence and Security (CIS)

Authors: Xi Qin | Tongge Xu | Chao Wang

Preventing Black Hole Attack in AODV using timer-based detection mechanism

PROCEEDINGS ARTICLE published January 2015 in 2015 International Conference on Signal Processing and Communication Engineering Systems

Authors: Nidhi Choudhary | Lokesh Tharani

Continuous monitoring methods as a mechanism for detection and mitigation of growing threats in banking security system

PROCEEDINGS ARTICLE published December 2015 in 2015 4th International Conference on Interactive Digital Media (ICIDM)

Authors: Bright Gameli Mawudor | Myong-Hee Kim | Man-Gon Park

A Novel Approach of Detection and Mitigation of DDOS Attack

PROCEEDINGS ARTICLE published 20 April 2015 in International Institute of Engineers April 20-21, 2015 Bangkok (Thailand)

Mitigation of byzantine attack using enhanced cooperative bait detection and prevention scheme (ECBDPS)

PROCEEDINGS ARTICLE published September 2015 in 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)

Authors: Renu Sharma | Jitender Grover

Network Attack Detection and Mitigation

PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops

Authors: Sangita Roy | Ashok Singh Sairam

MAD: A Middleware Framework for Multi-step Attack Detection

PROCEEDINGS ARTICLE published November 2015 in 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)

Authors: Panagiotis Papadopoulos | Thanasis Petsas | Giorgos Christou | Giorgos Vasiliadis

Deep Representation Learning for Cyber-Attack Detection in Industrial IoT

BOOK CHAPTER published 2021 in AI-Enabled Threat Detection and Security Analysis for Industrial IoT

Authors: Amir Namavar Jahromi | Hadis Karimipour | Ali Dehghantanha | Reza M. Parizi

MLDED: Multi-layer Data Exfiltration Detection System

PROCEEDINGS ARTICLE published October 2015 in 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec)

Authors: Mohammad Ahmad Abu Allawi | Ali Hadi | Arafat Awajan

Joint Self-Interference Mitigation and Physical-Layer Security Enhancement for Full Duplex Communications

PROCEEDINGS ARTICLE published December 2015 in 2015 IEEE Global Communications Conference (GLOBECOM)

Authors: Fengchao Zhu | Feifei Gao | Shun Zhang | Minli Yao

Joint Self-Interference Mitigation and Physical-Layer Security Enhancement for Full Duplex Communications

PROCEEDINGS ARTICLE published December 2014 in 2015 IEEE Global Communications Conference (GLOBECOM)

Authors: Fengchao Zhu | Feifei Gao | Shun Zhang | Minli Yao