Buscar
Mostrando ítems 1-10 de 17
Analysis of masquerade detectors performance under synthesized sessions-Edición Única
(Instituto Tecnológico y de Estudios Superiores de Monterrey, 2006-12-01)
Informatics security has nowadays become an important research topic given the impact of the computers
for mankind. As computers become more important, so the interests, risks and informatics attacks. With
this work we ...
Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
(NLM (Medline)CH, 2020)
In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders ...
Use flexibility of perch types by the branch-camouflaged Common Potoo (Nyctibius griseus): Why this bird may occasionally dare to perch on artificial substrates
(2018-03-01)
Animal species gain protection against visually oriented predators when they choose a suitable substrate that maximizes camouflaging. The choice of appropriate substrate may be particularly important during the brooding ...
Use flexibility of perch types by the branch-camouflaged Common Potoo (Nyctibius griseus): why this bird may occasionally dare to perch on artificial substrates
(Wilson Ornithological Soc, 2018-03-01)
Animal species gain protection against visually oriented predators when they choose a suitable substrate that maximizes camouflaging. The choice of appropriate substrate may be particularly important during the brooding ...
Detection of masqueraders based on graph partitioning of file system access events
Masqueraders are users who take control of a machine and perform malicious activities such as data exfiltration or system misuse on behalf of legitimate users. In the literature, there are various approaches for detecting ...
The Wolf of SUTD (TWOS): A dataset of malicious insider threat behavior based on a gamified competition
In this paper we present open research questions and options for data analysis of our previously designed dataset called TWOS: The Wolf of SUTD. In specified research questions, we illustrate the potential use of the TWOS ...