Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label
|
2021-05-25 |
The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good
|
2021-05-10 |
Context-Aware Software Vulnerabilities Classification using Machine Learning
|
2021-04-23 |
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis
|
2021-04-08 |
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data
|
2021-03-31 |
Unsupervised packet-based anomaly detection in virtual networks
|
2021-03-19 |
Kernel-level tracing for detecting stegomalware and covert channels in Linux environments
|
2021-03-18 |
Cyber reconnaissance techniques
|
2021-02-15 |
Trends and Challenges in Network Covert Channels Countermeasures
|
2021-02-11 |
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
|
2021-01-13 |
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
|
2020-12-30 |
Intrusion detection approach based on optimised artificial neural network
|
2020-12-19 |
Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance
|
2020-12-11 |
Test environment for security toolkit
|
2020-12-10 |
Covert Channels in One-Time Passwords Based on Hash Chains
|
2020-11-18 |
Covert Channels in Transport Layer Security
|
2020-11-18 |
Modification of Pitch Parameters in Speech Coding for Information Hiding
|
2020-09-01 |
Design and performance evaluation of reversible network covert channels
|
2020-08-26 |
Stegomalware detection through structural analysis of media files
|
2020-08-26 |
Real-time stream processing tool for detecting suspicious network patterns using machine learning
|
2020-08-25 |