An anomaly detection framework for cyber-security data (Englisch)
- Neue Suche nach: Evangelou, Marina
- Neue Suche nach: Adams, Niall M.
- Neue Suche nach: Evangelou, Marina
- Neue Suche nach: Adams, Niall M.
In:
Computers and Security
;
97
;
2020
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:An anomaly detection framework for cyber-security data
-
Beteiligte:Evangelou, Marina ( Autor:in ) / Adams, Niall M. ( Autor:in )
-
Erschienen in:
-
Erscheinungsdatum:17.06.2020
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 97
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Lightweight privacy-Preserving data classificationTran, Ngoc Hong / Le-Khac, Nhien-An / Kechadi, M-Tahar et al. | 2020
-
A semi-automated forensic investigation model for online social networksArshad, Humaira / Omlara, Esther / Abiodun, Isaac Oludare / Aminu, Abdulhai et al. | 2020
-
Protecting sensitive place visits in privacy-preserving trajectory publishingWang, Nana / Kankanhalli, Mohan S et al. | 2020
-
Passive- and not active-risk tendencies predict cyber security behaviorArend, Isabel / Shabtai, Asaf / Idan, Tali / Keinan, Ruty / Bereby-Meyer, Yoella et al. | 2020
-
Dynamic countermeasures selection for multi-path attacksLi, Fenghua / Li, Yongjun / Leng, Siyuan / Guo, Yunchuan / Geng, Kui / Wang, Zhen / Fang, Liang et al. | 2020
-
Coarse-to-fine two-stage semantic video carving approach in digital forensicsFang, Junbin / Xi, Guikai / Li, Rong / Chen, Qian / Lin, Puxi / Li, Sijin / Jiang, Zoe Lin / Yiu, Siu-Ming et al. | 2020
-
Authorship identification on limited samplingsBoran, Tudor / Martinaj, Muhamet / Hossain, Md Shafaeat et al. | 2020
-
Alerting about possible risks vs. blocking risky choices: A quantitative model and its empirical evaluationMeyer, Joachim / Dembinsky, Omer / Raviv, Tal et al. | 2020
-
Effects of planning and action control on smartphone security behaviorMi, Tianyue / Gou, Mengke / Zhou, Guangyu / Gan, Yiqun / Schwarzer, Ralf et al. | 2020
-
Security-Driven hybrid collaborative recommendation method for cloud-based iot servicesMeng, Shunmei / Gao, Zijian / Li, Qianmu / Wang, Hao / Dai, Hong-Ning / Qi, Lianyong et al. | 2020
-
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner viewsYang, Runkai / Chang, Xiaolin / Mišić, Jelena / Mišić, Vojislav B. et al. | 2020
-
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A surveyShi, Shuyun / He, Debiao / Li, Li / Kumar, Neeraj / Khan, Muhammad Khurram / Choo, Kim-Kwang Raymond et al. | 2020
-
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)Kumar, Rakesh / Goyal, Rinkaj et al. | 2020
-
Mitigation measures of collusive interest flooding attacks in named data networkingWu, Zhijun / Feng, Wenzhi / Yue, Meng / Xu, Xinran / Liu, Liang et al. | 2020
-
Understanding the security of app-in-the-middle IoTLiu, Hui / Li, Juanru / Gu, Dawu et al. | 2020
-
Editorial Board| 2019
-
Time pressure in human cybersecurity behavior: Theoretical framework and countermeasuresChowdhury, Noman H. / Adam, Marc T.P. / Teubner, Timm et al. | 2020
-
Efficient determination of equivalence for encrypted dataDoctor, Jason N. / Vaidya, Jaideep / Jiang, Xiaoqian / Wang, Shuang / Schilling, Lisa M. / Ong, Toan / Matheny, Michael E. / Ohno-Machado, Lucila / Meeker, Daniella et al. | 2020
-
Towards a novel biometric system for forensic document examinationDhieb, Thameur / Njah, Sourour / Boubaker, Houcine / Ouarda, Wael / Ben Ayed, Mounir / Alimi, Adel M. et al. | 2020
-
A nonproprietary language for the command and control of cyber defenses – OpenC2Mavroeidis, Vasileios / Brule, Joe et al. | 2020
-
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioningKarbab, ElMouatez Billah / Debbabi, Mourad / Derhab, Abdelouahid / Mouheb, Djedjiga et al. | 2020
-
Latent groups of cybersecurity preparedness in Europe: Sociodemographic factors and country-level contextsLee, Claire Seungeun / Kim, Ji Hye et al. | 2020
-
A differential game method against attacks in heterogeneous honeynetRen, Jianguo / Zhang, Chunming et al. | 2020
-
UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devicesDas, Ayan Kumar / Kalam, Sidra / Sahar, Nausheen / Sinha, Ditipriya et al. | 2020
-
An anomaly detection framework for cyber-security dataEvangelou, Marina / Adams, Niall M. et al. | 2020
-
A rewriting system for the assessment of XACML policies relationshipMejri, Mohamed / Yahyaoui, Hamdi / Mourad, Azzam / Chehab, Mohamad et al. | 2020
-
How do they find us? A study of geolocation tracking techniques of malicious web sitesMansoori, Masood / Welch, Ian et al. | 2020
-
Covert timing channel detection method based on time interval and payload length analysisHan, Jiaxuan / Huang, Cheng / Shi, Fan / Liu, Jiayong et al. | 2020
-
A distributed sensing data anomaly detection schemeYin, Chunyong / Li, Bo / Yin, Zhichao et al. | 2020
-
Attack plan recognition using hidden Markov and probabilistic inferenceLi, Tun / Liu, Yutian / Liu, Yanbing / Xiao, Yunpeng / Nguyen, Nang An et al. | 2020
-
New biostatistics features for detecting web bot activity on web applicationsRahman, Rizwan Ur / Tomar, Deepak Singh et al. | 2020
-
Exploring HTTPS security inconsistencies: A cross-regional perspectiveAlashwali, Eman Salem / Szalachowski, Pawel / Martin, Andrew et al. | 2020
-
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processesZhou, Yuyang / Cheng, Guang / Jiang, Shanqing / Zhao, Yuyu / Chen, Zihan et al. | 2020
-
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learningAshrafuzzaman, Mohammad / Das, Saikat / Chakhchoukh, Yacine / Shiva, Sajjan / Sheldon, Frederick T. et al. | 2020
-
RansomSpector: An introspection-based approach to detect crypto ransomwareTang, Fei / Ma, Boyang / Li, Jinku / Zhang, Fengwei / Su, Jipeng / Ma, Jianfeng et al. | 2020
-
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization modelsCompastié, Maxime / Badonnel, Rémi / Festor, Olivier / He, Ruan et al. | 2020
-
SoK: Machine vs. machine – A systematic classification of automated machine learning-based CAPTCHA solversDionysiou, Antreas / Athanasopoulos, Elias et al. | 2020
-
Privacy Preserving Face Recognition Utilizing Differential PrivacyChamikara, M.A.P. / Bertok, P. / Khalil, I. / Liu, D. / Camtepe, S. et al. | 2020
-
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contractsPatil, Akash Suresh / Hamza, Rafik / Hassan, Alzubair / Jiang, Nan / Yan, Hongyang / Li, Jin et al. | 2020
-
Shall we follow? Impact of reputation concern on information security managers’ investment decisionsShao, Xiuyan / Siponen, Mikko / Liu, Fufan et al. | 2020
-
Iris template protection using double bloom filter based feature transformationS, Ajish / AnilKumar, K S et al. | 2020
-
A systematic review of cyber-resilience assessment frameworksSepúlveda Estay, Daniel A. / Sahay, Rishikesh / Barfod, Michael B. / Jensen, Christian D. et al. | 2020
-
An efficient and privacy-preserving truth discovery scheme in crowdsensing applicationsZhang, Chuan / Xu, Chang / Zhu, Liehuang / Li, Yanwei / Zhang, Can / Wu, Huishu et al. | 2020
-
Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listingSun, Qizhang / Willemsen, Martijn C. / Knijnenburg, Bart P. et al. | 2020
-
DO-RA: Data-oriented runtime attestation for IoT devicesKuang, Boyu / Fu, Anmin / Zhou, Lu / Susilo, Willy / Zhang, Yuqing et al. | 2020
-
Aggregation-based location privacy: An information theoretic approachZhang, Wenjing / Jiang, Bo / Li, Ming / Tandon, Ravi / Liu, Qiao / Li, Hui et al. | 2020
-
Building cyber security awareness in a developing country: Lessons from MyanmarChang, Lennon Y.C. / Coppel, Nicholas et al. | 2020
-
Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networksKrishnan, R. Santhana / Julie, E. Golden / Robinson, Y. Harold / Kumar, Raghvendra / Thong, Pham Huy / Son, Le Hoang et al. | 2020
-
Functionality-based mobile application recommendation system with security and privacy awarenessRocha, Thiago / Souto, Eduardo / El-Khatib, Khalil et al. | 2020
-
Gaslight revisited: Efficient and powerful fuzzing of digital forensics toolsParuchuri, Shravya / Case, Andrew / Richard, Golden G. III et al. | 2020
-
Multiclass malware classification via first- and second-order texture statisticsVerma, Vinita / Muttoo, Sunil K. / Singh, V. B. et al. | 2020
-
A secured TPM integration scheme towards smart embedded system based collaboration networkLu, Di / Han, Ruidong / Wang, Yue / Wang, Yongzhi / Dong, Xuewen / Ma, Xindi / Li, Teng / Ma, Jianfeng et al. | 2020
-
A two authorities electronic vote schemeLarriba, Antonio M. / Sempere, José M. / López, Damián et al. | 2020
-
An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizationsvan der Kleij, Rick / Wijn, Remco / Hof, Tineke et al. | 2020
-
A novel approach for detecting vulnerable IoT devices connected behind a home NATMeidan, Yair / Sachidananda, Vinay / Peng, Hongyi / Sagron, Racheli / Elovici, Yuval / Shabtai, Asaf et al. | 2020
-
SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanismJin, Dongzi / Lu, Yiqin / Qin, Jiancheng / Cheng, Zhe / Mao, Zhongshu et al. | 2020
-
False data injection attacks and the insider threat in smart systemsGönen, Serkan / Sayan, H. Hüseyin / Yılmaz, Ercan Nurcan / Üstünsoy, Furkan / Karacayılmaz, Gökçe et al. | 2020