Buscar
Mostrando ítems 1-10 de 14
PRBS/EWMA Based Model for Predicting Burst Attacks (Brute Froce, DoS) in Computer Networks
(Ieee, 2014-01-01)
Burst attacks (e.g. Brute Force, DoS, DDoS, etc) have become a great concern for the today's computer networks, causing millions of losses to the society. Even though the detection of burst attacks is widely investigated, ...
Procedimiento de diseño de sistemas ciberfísicos de tiempo real tolerantes a ataques cibernéticos
(Universidad Autónoma de OccidenteDoctorado en IngenieríaFacultad de IngenieríaSantiago de Cali, 2022-04)
Las aplicaciones emergentes de automatización industrial demandan gran flexibilidad en los sistemas, lo cual se logra con en el aumento de la interconexión entre sus módulos, permitiendo el acceso a toda la información del ...
Grey Model and Polynomial Regression for Identifying Malicious Nodes in MANETs
(Ieee, 2014-01-01)
Nodes positioning is an essential issue for diverse applications in Mobile Ad Hoc Networks (MANETs). However, besides misbehaving nodes that could cause power depletion, MANETs are also susceptible to cyber-attacks, which ...
The SEIRS-NIMFA compartmental epidemic model for the analysis of IoT malware propagation
(Universidad de los AndesIngeniería de Sistemas y ComputaciónFacultad de IngenieríaDepartamento de Ingeniería Sistemas y Computación, 2023-07-07)
With IoT networks' rapid advancement and significant cybersecurity challenges, the proposal and analysis of models capable of studying malware propagation within these structures have become highly relevant. This paper ...
Recomendaciones de seguridad para los servicios de computación en la nube, a partir de los estándares y modelos de seguridad de la información
(Facultad de IngenieríaEspecialización en Seguridad de la Información, 2019)
Es importante identificar criterios y recomendaciones de seguridad que ayuden a las organizaciones a implementar la seguridad en la computación en la nube. Teniendo en cuenta lo anterior, este trabajo es una guía para las ...
ChaosXploit: A Security Chaos Engineering framework based on Attack Trees
Security incidents may have several origins. However, many times they are caused due to components that are supposed to be correctly configured or deployed. That is, traditional methods may not detect those security ...
Detecting malicious behavior in social platforms via hybrid knowledge and data driven systems
(Elsevier Science, 2021-12)
Among the wide variety of malicious behavior commonly observed in modern social platforms, one of the most notorious is the diffusion of fake news, given its potential to influence the opinions of millions of people who ...
Design of a network with VANET sporadic cloud computing applied to traffic accident prevention
(Corporación Universidad de la CostaRetracted, 2021)
Estudio comparativo de metodologías de selección de características en sistemas de detección de intrusos (Ids), basado en anomalías de red
(Maestría en Ingeniería (Énfasis en Redes y Software), 2018)
Approach to an emulation model to evaluate the behavior and impact of microgrids in isolated communities
(MDPI, 2021-08-27)
In microgrid projects, social ownership involves aspects beyond their operation that may compromise the sustainability of the system. For this reason, the development of analysis methods to assess the feasibility and impact ...