Sciweavers

158 search results - page 18 / 32
» Modeling and Preventing Phishing Attacks
Sort
View
DIMVA
2010
13 years 6 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
CEEMAS
2007
Springer
14 years 2 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
IEEEIAS
2007
IEEE
14 years 2 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
SAC
2010
ACM
14 years 3 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
ATAL
2008
Springer
13 years 10 months ago
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Janusz Marecki, Fernando ...