[HTML][HTML] Systematic review of graphical visual methods in honeypot attack data analysis
Mitigating increasing cyberattack incidents may require strategies such as reinforcing
organizations' networks with Honeypots and effectively analyzing attack traffic for detection …
organizations' networks with Honeypots and effectively analyzing attack traffic for detection …
A neural-visualization IDS for honeynet data
Neural intelligent systems can provide a visualization of the network traffic for security staff,
in order to reduce the widely known high false-positive rate associated with misuse-based …
in order to reduce the widely known high false-positive rate associated with misuse-based …
Beta-Hebbian Learning to enhance unsupervised exploratory visualizations of Android malware families
As it is well known, mobile phones have become a basic gadget for any individual that
usually stores sensitive information. This mainly motivates the increase in the number of …
usually stores sensitive information. This mainly motivates the increase in the number of …
Methods for post-processing of alerts in intrusion detection: A survey
Intrusion detection is an important protection tool for computer systems and networks. In
recent years it has become an essential piece in the IT security infrastructure of large …
recent years it has become an essential piece in the IT security infrastructure of large …
Embedded systems security: A survey of EU research efforts
Embedded systems security is a recurring theme in current research efforts, brought in the
limelight by the wide adoption of ubiquitous devices. Significant funding has been allocated …
limelight by the wide adoption of ubiquitous devices. Significant funding has been allocated …
Advanced 3d visualization of android malware families
The number of attacks aimed at compromising smartphones in general, and Android devices
in particular, is acknowledged as one of the main security concerns of these devices …
in particular, is acknowledged as one of the main security concerns of these devices …
Research and Application of Network Security Situational Awareness Technology Based on Ridge Regression
X Li, K Wei, H Gu, B Liu - … of the 2nd International Conference on Signal …, 2023 - dl.acm.org
In order to cope with increasingly complex network security issues, traditional rule-based
network security monitoring techniques cannot predict unknown network intrusion methods …
network security monitoring techniques cannot predict unknown network intrusion methods …
[PDF][PDF] Modelo ontológico para la predicción de ataques informáticos a partir de Honeynets virtualizadas.
Las honeynets son herramientas de seguridad informáticas usadas con el propósito de
reunir información de posibles atacantes acerca de las vulnerabilidades presentes en la …
reunir información de posibles atacantes acerca de las vulnerabilidades presentes en la …
A study of factors influencing cyberattacks
GT Ikuomenisan - 2022 - search.proquest.com
There has been a substantial global cyberattack evolution and Internet Use revolution
during the current Coronavirus pandemic, consequently forcing countries across the globe …
during the current Coronavirus pandemic, consequently forcing countries across the globe …
Advanced 3D Visualization of Android Malware Families
The number of attacks aimed at compromising smartphones in general, and Android devices
in particular, is acknowledged as one of the main security concerns of these devices …
in particular, is acknowledged as one of the main security concerns of these devices …