The method of identifying abnormal behavior of computer systems based on the Hurst exponent is examined in this report. Results of the research suggest the possibility of using the Hurst exponent for identifying the anomalous behavior of computer systems in the overall system to detect malicious software
Malware is a threat to information security and poses a security threat to harm networks or computer...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...
The method of identifying abnormal behavior of computer systems based on the Hurst exponent is exami...
The main requirement for modern systems of intrusion detection is the possibility of identifying dev...
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
One of the threats on digital environment is malicious software (malware). Malware can bring harm to...
This work proposes anomalous computer system behavior detection method based on probabilistic automa...
The object of this study was the process of detecting anomalies in computer systems. The task to tim...
The paper deals with the processing of information about the state of a computer system using a prob...
Malware is defined as any code that intentionally disrupts normal computer operation. The best-known...
Within our academic high-speed network infrastructure which is used for connecting all universities ...
AbstractComputers are top-rated essential commodities to the people across the world. The main conce...
In this paper, we consider the verification of the hypothesis in the research of computer incidents ...
Digital investigators often get involved with cases, which seemingly point the responsibility to the...
Malware is a threat to information security and poses a security threat to harm networks or computer...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...
The method of identifying abnormal behavior of computer systems based on the Hurst exponent is exami...
The main requirement for modern systems of intrusion detection is the possibility of identifying dev...
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
One of the threats on digital environment is malicious software (malware). Malware can bring harm to...
This work proposes anomalous computer system behavior detection method based on probabilistic automa...
The object of this study was the process of detecting anomalies in computer systems. The task to tim...
The paper deals with the processing of information about the state of a computer system using a prob...
Malware is defined as any code that intentionally disrupts normal computer operation. The best-known...
Within our academic high-speed network infrastructure which is used for connecting all universities ...
AbstractComputers are top-rated essential commodities to the people across the world. The main conce...
In this paper, we consider the verification of the hypothesis in the research of computer incidents ...
Digital investigators often get involved with cases, which seemingly point the responsibility to the...
Malware is a threat to information security and poses a security threat to harm networks or computer...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...