繁殖 发表于 2025-3-28 16:29:01

http://reply.papertrans.cn/87/8637/863614/863614_41.png

Connotation 发表于 2025-3-28 19:59:11

http://reply.papertrans.cn/87/8637/863614/863614_42.png

Mammal 发表于 2025-3-29 02:13:57

http://reply.papertrans.cn/87/8637/863614/863614_43.png

Disk199 发表于 2025-3-29 04:15:41

http://reply.papertrans.cn/87/8637/863614/863614_44.png

谷物 发表于 2025-3-29 08:00:25

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/863614.jpg

泰然自若 发表于 2025-3-29 12:34:51

https://doi.org/10.1007/978-3-319-60774-0anomaly detection; artificial intelligence; cloud computing; computer crime; computer networks; computer

SOB 发表于 2025-3-29 17:49:21

978-3-319-60773-3The Editor(s) (if applicable) and The Author(s) 2017

厌烦 发表于 2025-3-29 21:41:34

Security of Networks and Services in an All-Connected World978-3-319-60774-0Series ISSN 0302-9743 Series E-ISSN 1611-3349

entail 发表于 2025-3-30 00:58:57

Daphne Tuncer,Robert Koch,Burkhard StillerIncludes supplementary material:

一再困扰 发表于 2025-3-30 06:37:56

Hunting SIP Authentication Attacks Efficientlytocol (SIP), which is commonly used for VoIP signalling, is a frequent target of many types of attacks. This paper proposes and evaluates a novel algorithm for near real time detection of username scanning and password guessing attacks on SIP servers. The detection is based on analysis of L7 extended flow records.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Security of Networks and Services in an All-Connected World; 11th IFIP WG 6.6 Int Daphne Tuncer,Robert Koch,Burkhard Stiller Conference pro