Buscar
Mostrando ítems 1-10 de 15191
On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey
Organizations use Active Directory Windows service to authenticate users in a network with the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its resistance to the different types of ...
An Intrusion Detection System for Web-Based Attacks Using IBM Watson
(2022-02-01)
The internet and web applications have been growing steadily and together with the increasing number of cyber attacks. These attacks are carried out through requests that are considered normal or abnormal (attack requests). ...
PRBS/EWMA Based Model for Predicting Burst Attacks (Brute Froce, DoS) in Computer Networks
(Ieee, 2014-01-01)
Burst attacks (e.g. Brute Force, DoS, DDoS, etc) have become a great concern for the today's computer networks, causing millions of losses to the society. Even though the detection of burst attacks is widely investigated, ...
Kelp gulls attack Southern right whales: a conservation concern?
(Springer, 2012-09)
Kelp gulls (Larus dominicanus) feed on pieces of skin and blubber they rip from Southern right whales’ (Eubalaena australis) backs in their breeding areas at Península Valdés, Argentina, producing injuries. This behavior ...
An approach to abstract argumentation with recursive attack and support
(Elsevier Science, 2015-12)
This work introduces the Attack-Support Argumentation Framework (ASAF), an approach to abstract argumentation that allows for the representation and combination of attack and support relations. This framework extends the ...
Building a dataset through attack pattern modeling and analysis system
The different types of cyber-attacks on information and telecommunications systems are becoming increasingly sophisticated and complex, with several defined phases (attack pattern). Therefore, it is necessary to research ...
An Adaptive Multi-agent Solution to Detect DoS Attack in SOAP Messages
(2009-07-01)
A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. The specifications of existing security standards do not focus on this type of attack. This article ...
Cleaving paraoxon with hydroxylamine: Ammonium oxide isomer favors a Frontside attack mechanism
(2019-01-01)
A detailed molecular understanding of the mechanisms of the dephosphorylation of phosphate triesters due to nucleophilic attack can be very useful for the design of nucleophiles that are more efficient. In this work, we ...
Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing
Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer ...
Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system ...