Defraud 发表于 2025-3-25 03:35:15

Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques,urity managers to collect valuable information about the techniques and motivations of the attackers. However, when the amount of collected data in honeypots becomes very large, the analysis performed by a human security administrator tends to be very difficult, tedious and time consuming task. To f

负担 发表于 2025-3-25 11:23:36

A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes,any threats, vulnerabilities, and risks to which organizations maybe be exposed. In this paper, we discuss the need to provide a standard representation of security countermeasures in order to automate the selection of countermeasures for business processes. The main contribution lies in the specifi

scrape 发表于 2025-3-25 13:05:18

http://reply.papertrans.cn/48/4718/471728/471728_23.png

Entreaty 发表于 2025-3-25 18:13:56

Clustering for Intrusion Detection: Network Scans as a Case of Study,adding automatic response to this visualization-based IDS by means of clustering techniques. As a sample case of study for the proposed clustering extension, it has been applied to the identification of different network scans. The aim is checking whether clustering and projection techniques could b

Aphorism 发表于 2025-3-25 23:13:32

Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model,tive problem. We propose in this paper a new conceptual model . for .. The proposed technique could be used with machine learning based intrusion detection techniques. Our novel model uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the i

伪善 发表于 2025-3-26 00:40:17

Equivalent Inner Key Recovery Attack to NMAC, related key setting, by applying a generalized birthday attack with two groups. We can recover the equivalent inner key of NMAC in about 2. on-line MAC queries. The assumption of that the underlying hash function must be collision resistant is dropped in the security proof of NMAC. However, our res

CHYME 发表于 2025-3-26 06:50:57

Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems that supports the use of regular expressions in the patterns, and validate its use as part of the signature matching process, a critical component of modern intrusion detection systems. Our approach uses a hybrid memory storage mechanism, an adaptation of the Smith-Waterman local-sequence alignment

得罪 发表于 2025-3-26 11:06:04

Tracking Traitors in Web Services via Blind Signatures,e illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization.

音乐会 发表于 2025-3-26 16:34:51

C&C Techniques in Botnet Development, services and the increasing number of daily transactions performed in the cloud, makes them an attractive target for cybercriminals who have evolved their old IRC-based communication channels, into decentralized P2P networks, HTTP/S botnets and even Twitter-controlled networks. Against this backgro

Psychogenic 发表于 2025-3-26 20:40:25

http://reply.papertrans.cn/48/4718/471728/471728_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions; Álvaro Herrero,Václav Snášel,Emilio Corchado Conference procee