A taxonomy of botnet behavior, detection, and defense

S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …

Cyber scanning: a comprehensive survey

E Bou-Harb, M Debbabi, C Assi - Ieee communications surveys …, 2013 - ieeexplore.ieee.org
Cyber scanning refers to the task of probing enterprise networks or Internet wide services,
searching for vulnerabilities or ways to infiltrate IT assets. This misdemeanor is often the …

Cloud-based cyber-physical intrusion detection for vehicles using deep learning

G Loukas, T Vuong, R Heartfield, G Sakellari… - Ieee …, 2017 - ieeexplore.ieee.org
Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford
limited processing resources, proposed solutions are rule-based or lightweight machine …

On the understandability of temporal properties formalized in linear temporal logic, property specification patterns and event processing language

C Czepa, U Zdun - IEEE Transactions on Software Engineering, 2018 - ieeexplore.ieee.org
Temporal properties are important in a wide variety of domains for different purposes. For
example, they can be used to avoid architectural drift in software engineering orto support …

PERCEPTUS: Predictive complex event processing and reasoning for IoT-enabled supply chain

F Nawaz, NK Janjua, OK Hussain - Knowledge-Based Systems, 2019 - Elsevier
Abstract Internet of Things (IoT) is an emerging paradigm that connects various physical
sensor devices spread across different locations. IoT-enabled supply chain provides a …

An event-based platform for collaborative threats detection and monitoring

G Lodi, L Aniello, GA Di Luna, R Baldoni - Information Systems, 2014 - Elsevier
Organizations must protect their information systems from a variety of threats. Usually they
employ isolated defenses such as firewalls, intrusion detection and fraud monitoring …

Anomaly detection for SOME/IP using complex event processing

N Herold, SA Posselt, O Hanka… - NOMS 2016-2016 IEEE …, 2016 - ieeexplore.ieee.org
Recent developments favor the adoption of IP-based protocols in automotive and aerospace
domains. The increased connectivity between components helps to cut costs and enables …

Research agenda for supply chain management 4.0

F Jie, S Standing, N Janjua… - … Journal of Agile …, 2023 - inderscienceonline.com
The purpose of this paper is to conduct a systematic review of the supply chain management
4.0 literature in the principal logistics and supply chain management journals, across an …

[PDF][PDF] Employing the CEP paradigm for network analysis and surveillance

R Gad, M Kappes, J Boubeta-Puig, I Medina-Bulo - AICT 2013, 2013 - academia.edu
In this paper, we present a network analysis and surveillance system based on the Complex
Event Processing (CEP) paradigm. We demonstrate how complex event hierarchies based …

Incident handling systems with automated intrusion response

N Herold - 2017 - mediatum.ub.tum.de
Incident handling, consisting of intrusion detection, alert processing and intrusion response,
increases the resilience of IT systems under attack. Instead of providing a holistic solution …