While the number and variety of hazards to computer security have increased at an alarming rate, the proliferation of tools to combat this threat has not grown proportionally. Similarly, most tools currently rely on human intervention to recognize and diagnose new threats. We propose a general framework for identifying hazardous computer transactions by analyzing key metrics in network transactions. While a thorough determination of the particular traits to track would be a product of the research, we hypothesize that some or all of the following variables would yield high correlations with certain undesirable network transactions: Source Address Destination Address/Port Packet Size (overall, header...
This thesis examines a Distributed Interference Impact Probing (DIIP) strategy for Wireless Ad hoc ...
Network technology has experienced explosive growth in the past two decades. The vast connectivity o...
Cisco currently designs a variety of custom chassis for different types of servers, routers, and swi...
Cascaded events may cause a major blackout which will lead to a massive economic loss and even fatal...
In current embedded computer system development, the methodologies have experienced significant cha...
Treballs Finals de Grau d'Enginyeria Biomèdica. Facultat de Medicina i Ciències de la Salut. Univers...
This paper addresses an often overlooked “backdoor” into critical infrastructure control systems cre...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. C...
Cascading outages in power systems are costly events that power system operators and planners active...
Active network solutions have been proposed to many of the problems caused by the increasing heterog...
The Airline Search Engine Project is a tool that helps anyone to find the facts/data related to Airl...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
PhD ThesisEach section of the shipping market including the Newbuilding, Freight, Second-hand and D...
This thesis examines a Distributed Interference Impact Probing (DIIP) strategy for Wireless Ad hoc ...
Network technology has experienced explosive growth in the past two decades. The vast connectivity o...
Cisco currently designs a variety of custom chassis for different types of servers, routers, and swi...
Cascaded events may cause a major blackout which will lead to a massive economic loss and even fatal...
In current embedded computer system development, the methodologies have experienced significant cha...
Treballs Finals de Grau d'Enginyeria Biomèdica. Facultat de Medicina i Ciències de la Salut. Univers...
This paper addresses an often overlooked “backdoor” into critical infrastructure control systems cre...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. C...
Cascading outages in power systems are costly events that power system operators and planners active...
Active network solutions have been proposed to many of the problems caused by the increasing heterog...
The Airline Search Engine Project is a tool that helps anyone to find the facts/data related to Airl...
With an ever increasing number of attacks on networks that have an even more increasing amount of in...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
PhD ThesisEach section of the shipping market including the Newbuilding, Freight, Second-hand and D...
This thesis examines a Distributed Interference Impact Probing (DIIP) strategy for Wireless Ad hoc ...
Network technology has experienced explosive growth in the past two decades. The vast connectivity o...
Cisco currently designs a variety of custom chassis for different types of servers, routers, and swi...