Software birthmark design and estimation: a systematic literature review
The concept of software birthmark is developed for the detection of theft and piracy in
software applications. The originality of software can be evaluated by comparing software …
software applications. The originality of software can be evaluated by comparing software …
5gfiver: Functional integrity verification for 5G cloud-native network functions
5G networks attain a better performance along with a reduction in cost by cloudifying its
network functions as Cloud+ native Network Functions (CNFs). However, CNF may …
network functions as Cloud+ native Network Functions (CNFs). However, CNF may …
Integrity Verification for Virtualized Networks Using Side-Channel
ASM Asadujjaman - 2023 - spectrum.library.concordia.ca
Virtualization of networks has recently attracted enormous interest as an enabler of high-
performance, cost-effective, scalable, and reliable communication services (eg, 5G) …
performance, cost-effective, scalable, and reliable communication services (eg, 5G) …
Detection of zeus bot based on host and network activities
R Kalpika, AR Vasudevan - … , SSCC 2017, Manipal, India, September 13 …, 2017 - Springer
Botnet is a network of host machines infected by malicious code. Infected machines are bots
that perform illegitimate activities with the help of bot master who has remote control over the …
that perform illegitimate activities with the help of bot master who has remote control over the …
Segmentation and dynamic expansion of IDS rulesets
T Bannikere Eshwarappa - 2024 - diva-portal.org
This research explores an innovative approach to managing extensive rulesets in Host
Intrusion Detection Systems (HIDS) through segmentation and dynamic expansion. Drawing …
Intrusion Detection Systems (HIDS) through segmentation and dynamic expansion. Drawing …
Performance improvements in behavior based malware detection solutions
The constant evolution of malware, both in number and complexity, represents a severe
threat to individual users and organizations. This is increasing the need for more advanced …
threat to individual users and organizations. This is increasing the need for more advanced …
AI-Powered Detection and Prevention Tool to Secure APIs from Malicious Bot Attacks
Abstract The Application Programming Interface (API) has become the primary method for
integrating different software systems. Malicious bots have recently become the main cyber …
integrating different software systems. Malicious bots have recently become the main cyber …
Bots Impact On Online Surveys Within Special Education Research
C Deheck - 2023 - ir.vanderbilt.edu
Researchers use online surveys to collect data from diverse populations (Phillips, 2017;
Simone, 2019a). With the use of online surveys comes the potential for Artificial Intelligence …
Simone, 2019a). With the use of online surveys comes the potential for Artificial Intelligence …
High-Performance Graph Computing and Application in Cybersecurity
Y Ji - 2021 - search.proquest.com
Graph is a natural representation for many real-world applications, such as road map,
protein-protein interaction network, and code graph. The graph algorithms can help mine …
protein-protein interaction network, and code graph. The graph algorithms can help mine …
[LIBRO][B] Zero-Day Defense: Discovering and Removing Vulnerabilities throughProgram Customization and Fuzzing
Y Chen - 2020 - search.proquest.com
A zero-day attack happens when attackers exploit a cyber vulnerability that is unknown to
the public. It has been reported that 15% of the exploits occur before the disclosure of …
the public. It has been reported that 15% of the exploits occur before the disclosure of …