GRU-based deep learning approach for network intrusion alert prediction
The exponential growth in the number of cyber attacks in the recent past has necessitated
active research on network intrusion detection, prediction and mitigation systems. While …
active research on network intrusion detection, prediction and mitigation systems. While …
SoK: applications and challenges of using recommender systems in cybersecurity incident handling and response
M Husák, M Čermák - Proceedings of the 17th International Conference …, 2022 - dl.acm.org
Incident handling, a fundamental activity of a cybersecurity incident response team, is a
complex discipline that consumes a significant amount of personnel's time and costs. There …
complex discipline that consumes a significant amount of personnel's time and costs. There …
Attack projection
Having dedicated the previous chapter to the second level of SA, we now proceed to the
third level. The highest level of SA—projection—involves envisioning how the current …
third level. The highest level of SA—projection—involves envisioning how the current …
An automated approach for complementing ad blockers' blacklists
D Gugelmann, M Happe, B Ager… - Proceedings on Privacy …, 2015 - petsymposium.org
Privacy in the Web has become a major concern resulting in the popular use of various tools
for blocking tracking services. Most of these tools rely on manually maintained blacklists …
for blocking tracking services. Most of these tools rely on manually maintained blacklists …
Network entity characterization and attack prediction
The devastating effects of cyber-attacks, highlight the need for novel attack detection and
prevention techniques. Over the last years, considerable work has been done in the areas of …
prevention techniques. Over the last years, considerable work has been done in the areas of …
Shallow and deep learning approaches for network intrusion alert prediction
The ever-increasing frequency and intensity of intrusion attacks on computer networks
worldwide has necessitated intense research efforts towards the design of attack detection …
worldwide has necessitated intense research efforts towards the design of attack detection …
A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT
JMSP Josh Kumar, A Kathirvel, N Kirubakaran… - EURASIP Journal on …, 2015 - Springer
Recent years have witnessed the increasing efforts toward making architecture
standardization for the secured wireless mobile ad hoc networks. In this scenario when a …
standardization for the secured wireless mobile ad hoc networks. In this scenario when a …
PIF: A personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks
Mobile social network (MSN) emerges as a promising social network paradigm that enables
mobile users' information sharing in the proximity and facilitates their cyber-physical-social …
mobile users' information sharing in the proximity and facilitates their cyber-physical-social …
Prediction of attacks against honeynet based on time series modeling
P Sokol, A Gajdoš - … Methods: Computational Methods in Systems and …, 2018 - Springer
Honeypots are unconventional tools to study methods, tools, and goals of attackers. In
addition to IP addresses, these tools collect also timestamps. Therefore, time series analysis …
addition to IP addresses, these tools collect also timestamps. Therefore, time series analysis …
A word-level analytical approach for identifying malicious domain names caused by dictionary-based DGA malware
A Satoh, Y Fukuda, G Kitagata, Y Nakamura - Electronics, 2021 - mdpi.com
Computer networks are facing serious threats from the emergence of malware with
sophisticated DGAs (Domain Generation Algorithms). This type of DGA malware …
sophisticated DGAs (Domain Generation Algorithms). This type of DGA malware …