7   Artículos

 
en línea
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva    
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko and Sergei Verevkin    
Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mike Nkongolo, Jacobus Philippus van Deventer and Sydney Mambwe Kasongo    
This research attempts to introduce the production methodology of an anomaly detection dataset using ten desirable requirements. Subsequently, the article presents the produced dataset named UGRansome, created with up-to-date and modern network traffic (... ver más
Revista: Information    Formato: Electrónico

 
en línea
Damien Warren Fernando, Nikos Komninos and Thomas Chen    
This survey investigates the contributions of research into the detection of ransomware malware using machine learning and deep learning algorithms. The main motivations for this study are the destructive nature of ransomware, the difficulty of reversing... ver más
Revista: IoT    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »