[HTML][HTML] The security of ip-based video surveillance systems

N Kalbo, Y Mirsky, A Shabtai, Y Elovici - Sensors, 2020 - mdpi.com
Over the last decade, video surveillance systems have become a part of the Internet of
Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

ENDEMIC: End-to-End Network Disruptions-Examining Middleboxes, Issues, and Countermeasures-A Survey

I Benhabbour, M Dacier - ACM Computing Surveys, 2025 - dl.acm.org
Network middleboxes are important components in modern networking systems, impacting
approximately 40% of network paths according to recent studies [1]. This survey paper …

Frequency domain feature based robust malicious traffic detection

C Fu, Q Li, M Shen, K Xu - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

Man-in-the-middle and denial of service attacks detection using machine learning algorithms

SAM Al-Juboori, F Hazzaa, ZS Jabbar, S Salih… - Bulletin of Electrical …, 2023 - beei.org
Network attacks (ie, man-in-the-middle (MTM) and denial of service (DoS) attacks) allow
several attackers to obtain and steal important data from physical connected devices in any …

My site knows where you are: a novel browser fingerprint to track user position

T Wu, Y Song, F Zhang, S Gao… - ICC 2021-IEEE …, 2021 - ieeexplore.ieee.org
Utilizing browsers to identify and track users has become a routine on the Web in recent
years. It is easy for the browser to collect sensitive information and construct comprehensive …

Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions

J Kotak, E Habler, O Brodt, A Shabtai, Y Elovici - Sensors, 2023 - mdpi.com
During the COVID-19 pandemic, most organizations were forced to implement a work-from-
home policy, and in many cases, employees have not been expected to return to the office …

Softwarized IoT network immunity against eavesdrop** with programmable data planes

G Liu, W Quan, N Cheng, D Gao, N Lu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
State-of-the-art mechanisms against eavesdrop** first encrypt all packet payloads in the
application layer and then split the packets into multiple network paths. However, versatile …

Traffic data classification to detect man-in-the-middle attacks in industrial control system

H Lan, X Zhu, J Sun, S Li - 2019 6th International Conference …, 2020 - ieeexplore.ieee.org
Industrial Control Systems (ICS) are widely used in critical infrastructure in industries such
as power, rail transit, and water conservancy. As the connection between the corporate …

[BOK][B] Cybersecurity analytics

RM Verma, DJ Marchette - 2019 - taylorfrancis.com
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn
data science techniques critical for tackling cybersecurity challenges, and for the data …