Buscar
Mostrando ítems 11-20 de 5940
Statistical model applied to NetFlow for network intrusion detection
(2010-12-31)
The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point ...
Adaptive neural security control for networked singular systems under deception attacks
(2022)
This paper studies the issue of the adaptive neural security controller design for uncertain networked singular systems in the presence of deception attacks. Considering that the attack signal is unknown, the neural networks ...
Formal validation of automated policy refinement in the management of network security systems
(SPRINGER, 2010)
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ...
Offloading personal security applications to the Network Edge: A mobile user case scenario
(INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS INC., 2016-09-05)
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user ...
Utilização de firewall em aplicação de segurança e ferramentas gerenciais
(Universidade Tecnológica Federal do ParanáCuritibaBrasilTecnologia em Sistemas de TelecomunicaçõesUTFPR, 2017-06-08)
Information security is related to the protection of valuable data of an individual or a particular company, with the high demand in the search for information integrity and the confidentiality of systems, such as: banking ...
Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base
(2018-10-10)
In the latest years, the network computers and computational systems are receiving several cyber-attacks that affect its security. This issue is pushing researches at intrusion detection system (IDS) techniques development. ...