Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:FPS (14. : 2021 : Paris) Foundations and practice of security
1. Verfasser: Heine, Felix (VerfasserIn)
Weitere Verfasser: Kleiner, Carsten (VerfasserIn), Klostermeyer, Philip (VerfasserIn), Ahlers, Volker (VerfasserIn), Laue, Tim (VerfasserIn), Wellermann, Nils (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Revisiting Stream-Cipher-Based Homomorphic Transciphering in the TFHE Era 2022 Bendoukha, Adda-Akram
HistoTrust: Ethereum-Based Attestation of a Data History Built with OP-TEE and TPM 2022 Paulin, Dylan
Automatic Annotation of Confidential Data in Java Code 2022 Bastys, Julia
PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain 2022 Ankergård, Sigurd Frej Joel Jørgensen
Detecting Attacks in Network Traffic Using Normality Models: The Cellwise Estimator 2022 Heine, Felix
Why Anomaly-Based Intrusion Detection Systems Have Not Yet Conquered the Industrial Market? 2022 Seng, S.
At the Bottom of Binary Analysis: Instructions 2022 Bonfante, Guillaume
Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit Approach 2022 Murray, Hazel
Homomorphic Evaluation of Lightweight Cipher Boolean Circuits 2022 Mandal, Kalikinkar
Employing Feature Selection to Improve the Performance of Intrusion Detection Systems 2022 Avila, Ricardo
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection 2022 Vitorino, João
A Quantile-Based Watermarking Approach for Distortion Minimization 2022 Gort, Maikel Läzaro Perez
A Modular Runtime Enforcement Model Using Multi-traces 2022 Hallé,, Rania Taleb, Sylvain
K-Smali: An Executable Semantics for Program Verification of Reversed Android Applications 2022 Ziadia., Marwa
Secure and Robust Cyber Security Threat Information Sharing 2022 Bkakria, Anis
EXMULF: An Explainable Multimodal Content-Based Fake News Detection System 2022 Amri, Sabrine
An Automatized Identity and Access Management System for IoT Combining Self-Sovereign Identity and Smart Contracts 2022 Naghmouchi, Montassar
Lightweight Authentication and Encryption for Online Monitoring in IIoT Environments 2022 Garcia, Armando Miguel
Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3 2022 Lounis, Karim
A Tight Integration of Symbolic Execution and Fuzzing (Short Paper) 2022 Vinçont, Yaelle
Alle Artikel auflisten