Defraud 发表于 2025-3-25 03:35:15
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques,urity managers to collect valuable information about the techniques and motivations of the attackers. However, when the amount of collected data in honeypots becomes very large, the analysis performed by a human security administrator tends to be very difficult, tedious and time consuming task. To f负担 发表于 2025-3-25 11:23:36
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes,any threats, vulnerabilities, and risks to which organizations maybe be exposed. In this paper, we discuss the need to provide a standard representation of security countermeasures in order to automate the selection of countermeasures for business processes. The main contribution lies in the specifiscrape 发表于 2025-3-25 13:05:18
http://reply.papertrans.cn/48/4718/471728/471728_23.pngEntreaty 发表于 2025-3-25 18:13:56
Clustering for Intrusion Detection: Network Scans as a Case of Study,adding automatic response to this visualization-based IDS by means of clustering techniques. As a sample case of study for the proposed clustering extension, it has been applied to the identification of different network scans. The aim is checking whether clustering and projection techniques could bAphorism 发表于 2025-3-25 23:13:32
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model,tive problem. We propose in this paper a new conceptual model . for .. The proposed technique could be used with machine learning based intrusion detection techniques. Our novel model uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the i伪善 发表于 2025-3-26 00:40:17
Equivalent Inner Key Recovery Attack to NMAC, related key setting, by applying a generalized birthday attack with two groups. We can recover the equivalent inner key of NMAC in about 2. on-line MAC queries. The assumption of that the underlying hash function must be collision resistant is dropped in the security proof of NMAC. However, our resCHYME 发表于 2025-3-26 06:50:57
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems that supports the use of regular expressions in the patterns, and validate its use as part of the signature matching process, a critical component of modern intrusion detection systems. Our approach uses a hybrid memory storage mechanism, an adaptation of the Smith-Waterman local-sequence alignment得罪 发表于 2025-3-26 11:06:04
Tracking Traitors in Web Services via Blind Signatures,e illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization.音乐会 发表于 2025-3-26 16:34:51
C&C Techniques in Botnet Development, services and the increasing number of daily transactions performed in the cloud, makes them an attractive target for cybercriminals who have evolved their old IRC-based communication channels, into decentralized P2P networks, HTTP/S botnets and even Twitter-controlled networks. Against this backgroPsychogenic 发表于 2025-3-26 20:40:25
http://reply.papertrans.cn/48/4718/471728/471728_30.png