-
1
-
-
84893436006
-
A defense security approach for infrastructures against hacking
-
1606, 16-18 July
-
Alsunbul, S.; Le, P.; Tan, J., "A Defense Security Approach for Infrastructures against Hacking, " Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, vol., no., pp. 1600, 1606, 16-18 July 2013
-
(2013)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
, pp. 1600
-
-
Alsunbul, S.1
Le, P.2
Tan, J.3
-
2
-
-
0003795084
-
-
McGraw-Hill, Inc
-
S. McClure, J. Scambray, and G. Kurtz, Hacking Exposed: Network Security Secrets and Solutions, Seventh Edition: McGraw-Hill, Inc., 2012
-
(2012)
Hacking Exposed: Network Security Secrets and Solutions, Seventh Edition
-
-
McClure, S.1
Scambray, J.2
Kurtz, G.3
-
3
-
-
84946148634
-
Advanced persistent threats-detection and defense
-
1330, 25-29 May
-
Vukalovic, J.; Delija, D., "Advanced Persistent Threats-detection and defense, " Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention on, vol., no., pp. 1324, 1330, 25-29 May 2015
-
(2015)
Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention on
, pp. 1324
-
-
Vukalovic, J.1
Delija, D.2
-
4
-
-
84906739769
-
Formal approach for managing firewall misconfigurations
-
10, 28-30 May
-
Saadaoui, A.; Ben Souayeh, N.B.Y.; Bouhoula, A., "Formal approach for managing firewall misconfigurations, " Research Challenges in Information Science (RCIS), 2014 IEEE Eighth International Conference on, vol., no., pp. 1, 10, 28-30 May 2014
-
(2014)
Research Challenges in Information Science (RCIS), 2014 IEEE Eighth International Conference on
, pp. 1
-
-
Saadaoui, A.1
Ben Souayeh, N.B.Y.2
Bouhoula, A.3
-
5
-
-
84935108505
-
Behind an application firewall, are we safe from SQL injection attacks?
-
10, 13-17 April
-
Appelt, D.; Nguyen, C.D.; Briand, L., "Behind an Application Firewall, Are We Safe from SQL Injection Attacks?, " Software Testing, Verification and Validation (ICST), 2015 IEEE 8th International Conference on, vol., no., pp. 1, 10, 13-17 April 2015
-
(2015)
Software Testing, Verification and Validation (ICST), 2015 IEEE 8th International Conference on
, pp. 1
-
-
Appelt, D.1
Nguyen, C.D.2
Briand, L.3
-
6
-
-
84946689903
-
Improving web application firewalls to detect advanced SQL injection attacks
-
40, 28-30 Nov.
-
Makiou, A.; Begriche, Y.; Serhrouchni, A., "Improving Web Application Firewalls to detect advanced SQL injection attacks, " Information Assurance and Security (IAS), 2014 10th International Conference on, vol., no., pp. 35, 40, 28-30 Nov. 2014
-
(2014)
Information Assurance and Security (IAS), 2014 10th International Conference on
, pp. 35
-
-
Makiou, A.1
Begriche, Y.2
Serhrouchni, A.3
-
7
-
-
84890540035
-
Attacking the IDS learning processes
-
8691, 26-31 May
-
Pevny, T.; Komon, M.; Rehaky, M., "Attacking the IDS learning processes, " Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, vol., no., pp. 8687, 8691, 26-31 May 2013
-
(2013)
Acoustics, Speech and Signal Processing (ICASSP) 2013 IEEE International Conference on
, pp. 8687
-
-
Pevny, T.1
Komon, M.2
Rehaky, M.3
-
8
-
-
84867976535
-
Unknown attacks detection using feature extraction from anomaly-based IDS alerts
-
277, 16-20 July
-
Sato, M.; Yamaki, H.; Takakura, H., "Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS Alerts, " Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on, vol., no., pp. 273, 277, 16-20 July 2012.s
-
(2012)
Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on
, pp. 273
-
-
Sato, M.1
Yamaki, H.2
Takakura, H.3
-
9
-
-
84903850727
-
Intrusion detection and prevention system: Challenges & opportunities
-
809, 5-7 March
-
Bashir, U.; Chachoo, M., "Intrusion detection and prevention system: Challenges & opportunities, " Computing for Sustainable Global Development (INDIACom), 2014 International Conference on, vol., no., pp. 806, 809, 5-7 March 2014
-
(2014)
Computing for Sustainable Global Development (INDIACom) 2014 International Conference on
, pp. 806
-
-
Bashir, U.1
Chachoo, M.2
-
10
-
-
84868154072
-
A practical network-based intrusion detection and prevention system
-
214, 25-27 June
-
Wattanapongsakorn, N.; Srakaew, S.; Wonghirunsombat, E.; Sribavonmongkol, C.; Junhom, T.; Jongsubsook, P.; Charnsripinyo, C., "A Practical Network-Based Intrusion Detection and Prevention System, " Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, vol., no., pp. 209, 214, 25-27 June 2012
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
, pp. 209
-
-
Wattanapongsakorn, N.1
Srakaew, S.2
Wonghirunsombat, E.3
Sribavonmongkol, C.4
Junhom, T.5
Jongsubsook, P.6
Charnsripinyo, C.7
-
11
-
-
84861492152
-
A study of methodologies used in intrusion detection and prevention systems (IDPS)
-
6, 15-18 March
-
Mudzingwa, D.; Agrawal, R., "A study of methodologies used in intrusion detection and prevention systems (IDPS), " Southeastcon, 2012 Proceedings of IEEE, vol., no., pp. 1, 6, 15-18 March 2012
-
(2012)
Southeastcon 2012 Proceedings of IEEE
, pp. 1
-
-
Mudzingwa, D.1
Agrawal, R.2
-
12
-
-
1642516070
-
The Honeynet Project: Trapping the hackers
-
L. Spitzner, "The Honeynet Project: trapping the hackers, " Security & Privacy, IEEE, vol. 1, pp. 15-23, 2003
-
(2003)
Security & Privacy IEEE
, vol.1
, pp. 15-23
-
-
Spitzner, L.1
-
13
-
-
84913593582
-
A new type of intrusion prevention system
-
364, 26-28 April
-
Song Li; Qian Zou; Wei Huang, "A new type of intrusion prevention system, " Information Science, Electronics and Electrical Engineering (ISEEE), 2014 International Conference on, vol.1, no., pp. 361, 364, 26-28 April 2014
-
(2014)
Information Science, Electronics and Electrical Engineering (ISEEE) 2014 International Conference on
, vol.1
, pp. 361
-
-
Li, S.1
Zou, Q.2
Huang, W.3
|