Methodological identification of anomalies episodes in ECG streams: a systematic map** study

U Iqbal, R Almakki, M Usman, A Altameem… - BMC Medical Research …, 2024 - Springer
An electrocardiogram is a medical examination tool for measuring different patterns of heart
blood flow circle either in the form of usual or non-invasive patterns. These patterns are …

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge

M Ceccato, P Tonella, C Basile, P Falcarin… - Empirical Software …, 2019 - Springer
When critical assets or functionalities are included in a piece of software accessible to the
end users, code protections are used to hinder or delay the extraction or manipulation of …

Infrastructure for generating new ids dataset

J Uramová, P Scgeč, M Moravčík… - 2018 16th …, 2018 - ieeexplore.ieee.org
This article describes the proposal of a system that was designed for effective network
monitoring, analysis of network infiltration, and archiving of network flows for their later …

SDN based cognitive security system for large-scale Internet of Things using fog computing

S Prabavathy, V Supriya - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is penetrating into every aspect of our personal lives including our
body, our home and our living environment which poses numerous security challenges. The …

Design and Development of System for Post-infection Attack Behavioral Analysis

TH Kamati, DS Jat, S Chamotra - Proceedings of Fifth International …, 2020 - Springer
Attacks targeting government and public networks for getting political, and strategic
advantage is a common phenomenon. Most of the time these targeted attacks are state …

Revisiting Automotive Threat Analysis by Leveraging the Elements of the Threat Landscape

A Åström - Proceedings of the 2024 Cyber Security in CarS …, 2023 - dl.acm.org
The automotive industry faces significant challenges due to rapid advancements in areas
such as increased connectivity, automated driving, and electrification. These advancements …

[PDF][PDF] Prediction of Ongoing Attacks using System Behavioural Traces

SA Lakshmi, V Pavithra, KN Mallikarjunan - 2020 - academia.edu
If a human thinks that the number of cyber attacks are increasing, then he/she is not wrong.
In fact, it's probably worse than he/she realizes. Cyber attacks are a major threat faced by all …

[CITATION][C] 基于 EBLOF 算法的攻击者 IP 分析系统及应用

范敏, **昌茂, 陈飞宇, 陈超一 - 2022 - 工程科学与技术