Bilatu
26-tik 21-26 emaitza erakusten
A collaborative framework for android malware detection using DNS & dynamic analysis
(IEEE, 2018)
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, ...
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
(SCITEPRESS, 2016)
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities ...
Different approaches for the detection of SSH anomalous connections
(Oxford Academic, 2016)
The Secure Shell Protocol (SSH) is a well-known standard protocol, mainly used for remotely accessing shell accounts on Unix-like operating systems to perform administrative tasks. As a result, the SSH service has been an ...
Detection and Visualization of Android Malware Behavior
(Hindawi Publishing Corporation, 2016)
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious ...
poliSPAM: Analisis de la eficiencia del spam personalizado utilizando informacion publica de redes sociales
(Mondragon Unibertsitatea, 2012)
Las campañas de envío de correos electrónicos no deseados siguen siendo una de las mayores amenazas que afectan a millones de usuarios al día. Si bien los filtros antispam son capaces de detectar y rechazar un número elevado ...