找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions; Álvaro Herrero,Václav Snášel,Emilio Corchado Conference procee

[复制链接]
楼主: Flange
发表于 2025-3-25 03:35:15 | 显示全部楼层
Automatic Analysis of Web Service Honeypot Data Using Machine Learning Techniques,urity managers to collect valuable information about the techniques and motivations of the attackers. However, when the amount of collected data in honeypots becomes very large, the analysis performed by a human security administrator tends to be very difficult, tedious and time consuming task. To f
发表于 2025-3-25 11:23:36 | 显示全部楼层
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes,any threats, vulnerabilities, and risks to which organizations maybe be exposed. In this paper, we discuss the need to provide a standard representation of security countermeasures in order to automate the selection of countermeasures for business processes. The main contribution lies in the specifi
发表于 2025-3-25 13:05:18 | 显示全部楼层
发表于 2025-3-25 18:13:56 | 显示全部楼层
Clustering for Intrusion Detection: Network Scans as a Case of Study,adding automatic response to this visualization-based IDS by means of clustering techniques. As a sample case of study for the proposed clustering extension, it has been applied to the identification of different network scans. The aim is checking whether clustering and projection techniques could b
发表于 2025-3-25 23:13:32 | 显示全部楼层
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual Model,tive problem. We propose in this paper a new conceptual model . for .. The proposed technique could be used with machine learning based intrusion detection techniques. Our novel model uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the i
发表于 2025-3-26 00:40:17 | 显示全部楼层
Equivalent Inner Key Recovery Attack to NMAC, related key setting, by applying a generalized birthday attack with two groups. We can recover the equivalent inner key of NMAC in about 2. on-line MAC queries. The assumption of that the underlying hash function must be collision resistant is dropped in the security proof of NMAC. However, our res
发表于 2025-3-26 06:50:57 | 显示全部楼层
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems that supports the use of regular expressions in the patterns, and validate its use as part of the signature matching process, a critical component of modern intrusion detection systems. Our approach uses a hybrid memory storage mechanism, an adaptation of the Smith-Waterman local-sequence alignment
发表于 2025-3-26 11:06:04 | 显示全部楼层
Tracking Traitors in Web Services via Blind Signatures,e illegally when accessing services provided through Internet (Web services, Streaming, etc). The method devised is able to identify the legitimate user from those users who are illegally accessing services with a shared key. This method is robust when detecting licenses built with no authorization.
发表于 2025-3-26 16:34:51 | 显示全部楼层
C&C Techniques in Botnet Development, services and the increasing number of daily transactions performed in the cloud, makes them an attractive target for cybercriminals who have evolved their old IRC-based communication channels, into decentralized P2P networks, HTTP/S botnets and even Twitter-controlled networks. Against this backgro
发表于 2025-3-26 20:40:25 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-14 22:18
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表