Towards the detection of phishing attacks
AA Athulya, K Praveen - 2020 4th international conference on …, 2020 - ieeexplore.ieee.org
Phishing is an act of creating a website similar to a legitimate website with a motive of
stealing user's confidential information. Phishing fraud might be the most popular …
stealing user's confidential information. Phishing fraud might be the most popular …
Key-recovery attacks on KIDS, a keyed anomaly detection system
Most anomaly detection systems rely on machine learning algorithms to derive a model of
normality that is later used to detect suspicious events. Some works conducted over the last …
normality that is later used to detect suspicious events. Some works conducted over the last …
Automatic generation of HTTP intrusion signatures by selective identification of anomalies
In this paper, we introduce a novel methodology to automatically generate HTTP intrusion
signatures for Network Intrusion Detection Systems (NIDS). Our approach relies on the use …
signatures for Network Intrusion Detection Systems (NIDS). Our approach relies on the use …
Defacement detection with passive adversaries
F Bergadano, F Carretto, F Cogno, D Ragno - Algorithms, 2019 - mdpi.com
A novel approach to defacement detection is proposed in this paper, addressing explicitly
the possible presence of a passive adversary. Defacement detection is an important security …
the possible presence of a passive adversary. Defacement detection is an important security …
[HTML][HTML] Application Layer Protocol Identification Method Based on ResNet
Z Fang, X Gao, H Zhang, J Tang, Q Gao - Algorithms, 2025 - mdpi.com
Most network attacks occur at the application layer, where many application layer protocols
exist. These protocols have different structures and functionalities, posing feature extraction …
exist. These protocols have different structures and functionalities, posing feature extraction …
Randomized anagram revisited
When compared to signature-based Intrusion Detection Systems (IDS), anomaly detectors
present the potential advantage of detecting previously unseen attacks, which makes them …
present the potential advantage of detecting previously unseen attacks, which makes them …
Keyed learning: An adversarial learning framework—formalization, challenges, and anomaly detection applications
F Bergadano - ETRI Journal, 2019 - Wiley Online Library
We propose a general framework for keyed learning, where a secret key is used as an
additional input of an adversarial learning system. We also define models and formal …
additional input of an adversarial learning system. We also define models and formal …
Cryptography and multiplicative arithmetic functions
A Conci, T MacHenry - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
The security of information has become even more important with the increased use of the
internet, mobile communication and even social networking, all of which have intensified the …
internet, mobile communication and even social networking, all of which have intensified the …
Defacement response via keyed learning
F Bergadano, F Carretto, F Cogno… - 2017 8th International …, 2017 - ieeexplore.ieee.org
Defacement Response via Keyed Learning Page 1 Defacement Response via Keyed
Learning Francesco Bergadano, Fabio Carretto Department of Computer Science University of …
Learning Francesco Bergadano, Fabio Carretto Department of Computer Science University of …
[PDF][PDF] Survey on keyed IDS and key recovery attacks
VM Lomte, D Patil - Int. J. Sci. Research, 2015 - academia.edu
With the anomaly detection systems, many approaches and techniques have been
developed to track novel attacks on the systems. Anomaly detection systems based on …
developed to track novel attacks on the systems. Anomaly detection systems based on …