The method of identifying abnormal behavior of computer systems based on the Hurst exponent is examined in this report. Results of the research suggest the possibility of using the Hurst exponent for identifying the anomalous behavior of computer systems in the overall system to detect malicious software
Within our academic high-speed network infrastructure which is used for connecting all universities ...
Malware undoubtedly have become a major threat in modern society and their numbers are growing daily...
The article analyzes the paths and algorithms for automating the monitoring of computer system state...
The method of identifying abnormal behavior of computer systems based on the Hurst exponent is exami...
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
Most computerized information systems we use in our everyday lives provide very little protection ag...
One of the threats on digital environment is malicious software (malware). Malware can bring harm to...
The paper deals with the processing of information about the state of a computer system using a prob...
The object of this study was the process of detecting anomalies in computer systems. The task to tim...
Digital investigators often get involved with cases, which seemingly point the responsibility to the...
This work proposes anomalous computer system behavior detection method based on probabilistic automa...
Malware is defined as any code that intentionally disrupts normal computer operation. The best-known...
In this paper, we consider the verification of the hypothesis in the research of computer incidents ...
Malware is a threat to information security and poses a security threat to harm networks or computer...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...
Within our academic high-speed network infrastructure which is used for connecting all universities ...
Malware undoubtedly have become a major threat in modern society and their numbers are growing daily...
The article analyzes the paths and algorithms for automating the monitoring of computer system state...
The method of identifying abnormal behavior of computer systems based on the Hurst exponent is exami...
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
Most computerized information systems we use in our everyday lives provide very little protection ag...
One of the threats on digital environment is malicious software (malware). Malware can bring harm to...
The paper deals with the processing of information about the state of a computer system using a prob...
The object of this study was the process of detecting anomalies in computer systems. The task to tim...
Digital investigators often get involved with cases, which seemingly point the responsibility to the...
This work proposes anomalous computer system behavior detection method based on probabilistic automa...
Malware is defined as any code that intentionally disrupts normal computer operation. The best-known...
In this paper, we consider the verification of the hypothesis in the research of computer incidents ...
Malware is a threat to information security and poses a security threat to harm networks or computer...
Security assurance in a computer system can be viewed as distinguishing between self and non-self. A...
Within our academic high-speed network infrastructure which is used for connecting all universities ...
Malware undoubtedly have become a major threat in modern society and their numbers are growing daily...
The article analyzes the paths and algorithms for automating the monitoring of computer system state...