Labelled Network Capture Generation for Anomaly Detection for a Customized, Secure, and (Englisch)
- Neue Suche nach: Nogues, Maël
- Neue Suche nach: Brosset, David
- Neue Suche nach: Hindy, Hanan
- Neue Suche nach: Bellekens, Xavier
- Neue Suche nach: Kermarrec, Yvon
- Neue Suche nach: Nogues, Maël
- Neue Suche nach: Brosset, David
- Neue Suche nach: Hindy, Hanan
- Neue Suche nach: Bellekens, Xavier
- Neue Suche nach: Kermarrec, Yvon
In:
Foundations and practice of security
; 98-116
;
2020
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Labelled Network Capture Generation for Anomaly Detection for a Customized, Secure, and
-
Beteiligte:Nogues, Maël ( Autor:in ) / Brosset, David ( Autor:in ) / Hindy, Hanan ( Autor:in ) / Bellekens, Xavier ( Autor:in ) / Kermarrec, Yvon ( Autor:in )
-
Kongress:FPS ; 12. ; 2019 ; Toulouse
-
Erschienen in:Foundations and practice of security ; 98-116
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2020
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
PAC: Privacy-Preserving Arrhythmia Classification with Neural NetworksMansouri, Mohamad / Bozdemir, Beyza / Önen, Melek / Ermis, Orhan et al. | 2020
- 20
-
Ransomware Network Traffic Analysis for Pre-encryption AlertMoussaileb, Routa / Cuppens, Nora / Lanet, Jean-Louis / Bouder, Hélène Le et al. | 2020
- 39
-
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy VehiclesShirazi, Hossein / Ray, Indrakshi / Anderson, Charles et al. | 2020
- 56
-
Selection and Performance Analysis of CICIDS2017 Features ImportanceReis, Bruno / Maia, Eva / Praça, Isabel et al. | 2020
- 72
-
Semantic Representation Based on Deep Learning for Spam DetectionSaidani, Nadjate / Adi, Kamel / Allili, Mohand Said et al. | 2020
- 82
-
Interpreting Machine Learning Malware Detectors Which Leverage N-gram AnalysisBriguglio, William / Saad, Sherif et al. | 2020
- 98
-
Labelled Network Capture Generation for Anomaly Detection for a Customized, Secure, andNogues, Maël / Brosset, David / Hindy, Hanan / Bellekens, Xavier / Kermarrec, Yvon et al. | 2020
- 117
-
Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLSYang, Meng / Gong, Guang et al. | 2020
- 137
-
Secure Logging with Security Against Adaptive Crash AttackAvizheh, Sepideh / Safavi-Naini, Reihaneh / Li, Shuai et al. | 2020
- 156
-
Enroll, and Authentication Will Follow: eID-Based Enrollment for a Customized, Secture, and Frictionless Authentication ExperienceRanise, Silvio / Sciarretta, Giada / Tomasi, Alessandro et al. | 2020
- 172
-
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABEPreuveneers, Davy / Joosen, Wouter et al. | 2020
- 189
-
Protecting Android Apps from Repackaging Using Native CodeTanner, Simon / Vogels, lian / Wattenhofer, Roger et al. | 2020
- 207
-
Command Dependencies in Heuristic Safety Analysis of Access Control ModelsAmthor, Peter / Rabe, Martin et al. | 2020
- 225
-
On Attribute Retrieval in ABACMorisset, Charles / Ravidas, Sowmya / Zannone, Nicola et al. | 2020
- 242
-
Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access ControlServos, Daniel / Bauer, Michael et al. | 2020
- 261
-
U-EPS: An Ultra-small and Efficient Post-quantum Signature SchemeGong, Guang / He, Morgan / Rohit, Raghvendra / Yi, Yunjie et al. | 2020
- 273
-
An Efficient Identification Scheme Based on Rank MetricAyebie, Edoukou Berenger / Assidi, Hafsa / Souidi, El Mamoun et al. | 2020
- 290
-
Security Analysis of Auctionity: A Blockchain Based E-AuctionLafourcade, Pascal / Nopere, Mike / Picot, Jérémy / Pizzuti, Daniela / Roudeix, Etienne et al. | 2020
- 308
-
Dynamic Searchable Encryption with Access ControlBlömer, Johannes / Löken, Nils et al. | 2020
- 327
-
Get-your-ID: Decentralized Proof of IdentityLafourcade, Pascal / Lombard-Platet, Marius et al. | 2020
- 337
-
Towards Secure TMIS ProtocolsGerault, David / Lafourcade, Pascal et al. | 2020
- 345
-
Detecting Ransomware in Encrypted Web TrafficModi, Jaimin / Traore, Issa / Ghaleb, Asem / Ganame, Karim / Ahmed, Sherif et al. | 2020
- 354
-
Digital Forensics in Vessel Transportation SystemsCantelli-Forti, Alessandro / Colajanni, Michele et al. | 2020
- 363
-
A Privacy Protection Layer for Wearable DevicesMohzary, Muhammad / Tadisetty, Srikanth / Ghazinour, Kambiz et al. | 2020
- 371
-
Validating the DFA Attack Resistance of AES (Short Paper)Sugimoto, Hakuei / Hatano, Ryota / Shoji, Natsu / Sakiyama, Kazuo et al. | 2020
- 379
-
A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web ApplicationsSaoudi, Lalia / Adi, Kamel / Boudraa, Younes et al. | 2020
- 387
-
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions HistoryAlshahrani, Mohammed / Traore, Issa / Saad, Sherif et al. | 2020
- 398
-
Towards Privacy-Aware Smart SurveillanceShirima, Emil / Ghazinour, Kambiz et al. | 2020