Fuzzy Ids As A Service On The Cloud For Malicious Tcp Port Scanning Traffic Detection | 1 | 0.35 | 2020 |
Exploring the Opportunities of Cisco Packet Tracer For Hands-on Security Courses on Firewalls | 0 | 0.34 | 2019 |
A Basic Course Model on Information Security for High School IT Curriculum | 0 | 0.34 | 2019 |
Teaching Emerging DDoS Attacks on Firewalls: A Case Study of the BlackNurse Attack | 0 | 0.34 | 2019 |
A Dendritic Cell Algorithm Based Approach For Malicious Tcp Port Scanning Detection | 0 | 0.34 | 2019 |
Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection | 0 | 0.34 | 2019 |
Enhancing Firewall Filter Performance Using Neural Networks | 0 | 0.34 | 2019 |
An Approach for Thwarting Malicious Secret Channel - The Case of IP Record Route Option Header-Based Covert Channels. | 0 | 0.34 | 2019 |
Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack. | 0 | 0.34 | 2019 |
Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack | 0 | 0.34 | 2019 |
Cloud Automation to Run Large-Scale Quantum Chemical Simulations | 0 | 0.34 | 2018 |
An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification | 0 | 0.34 | 2018 |
Teaching keylogging and network eavesdropping attacks: Student threat and school liability concerns. | 0 | 0.34 | 2018 |
Improved Session Table Architecture for Denial of Stateful Firewall Attacks | 0 | 0.34 | 2018 |
Hybrid mechanism towards network packet early acceptance and rejection for unified threat management. | 0 | 0.34 | 2017 |
Android based mobile apps for information security hands-on education | 1 | 0.36 | 2017 |
Approaches to analyze cyber terrorist communities: Survey and challenges. | 0 | 0.34 | 2017 |
Network Packet Filtering And Deep Packet Inspection Hybrid Mechanism For Ids Early Packet Matching | 1 | 0.36 | 2016 |
The Robustness Of Microsoft Windows And Apple Mac Os X Against Arp Cache Poisoning Based Network Attacks | 0 | 0.34 | 2016 |
A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation. | 1 | 0.36 | 2016 |
Virtualization based ethical educational platform for hands-on lab activities on DoS attacks. | 1 | 0.36 | 2016 |
Edu-firewall device: An advanced firewall hardware device for information security education | 0 | 0.34 | 2016 |
Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream. | 2 | 0.38 | 2016 |
Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network. | 0 | 0.34 | 2016 |
Architectures and Strategies for Efficient Communication in Wireless Sensor Networks Using Unmanned Aerial Vehicles. | 0 | 0.34 | 2016 |
Ethical Hacking in Information Security Curricula | 4 | 0.51 | 2016 |
An extended identity-based cryptography protocol based on biometric. | 0 | 0.34 | 2016 |
Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement | 2 | 0.39 | 2015 |
On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal. | 0 | 0.34 | 2015 |
Resiliency of Smart Power Meters to Common Security Attacks | 0 | 0.34 | 2015 |
IDS performance enhancement technique based on dynamic traffic awareness histograms | 1 | 0.37 | 2014 |
Towards more reliable and secure source routing in mobile ad hoc and sensor networks | 2 | 0.38 | 2014 |
A web-based firewall simulator tool for information security education | 2 | 0.39 | 2014 |
Dynamic rule and rule-field optimisation for improving firewall performance and security | 5 | 0.53 | 2014 |
Teaching ethical hacking in information security curriculum: A case study | 3 | 0.47 | 2013 |
Dynamic traffic awareness statistical model for firewall performance enhancement | 5 | 0.44 | 2013 |
A Hands-On Approach For Teaching Denial Of Service Attacks: A Case Study | 1 | 0.38 | 2013 |
Using network packet generators and snort rules for teaching denial of service attacks | 6 | 0.53 | 2013 |
Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement | 11 | 0.74 | 2012 |
Firewall packet matching optimization using network traffic behavior and packet matching statistics | 0 | 0.34 | 2012 |
Firewall packet filtering optimization using statistical traffic awareness test | 0 | 0.34 | 2012 |
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning | 8 | 0.76 | 2011 |
Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security rule | 0 | 0.34 | 2011 |
Updating snort with a customized controller to thwart port scanning | 4 | 0.49 | 2011 |
On investigating ARP spoofing security solutions | 4 | 0.54 | 2010 |
Implementation of a DNA-based anomaly identification system utilizing associative string processor (ASP) | 0 | 0.34 | 2010 |
Towards More Secure Biometric Readers for Effective Digital Forensic Investigation | 0 | 0.34 | 2010 |
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks | 1 | 0.38 | 2009 |
On fault tolerant ad hoc network design | 0 | 0.34 | 2009 |
Firewall filtering rules analysis for anomalies detection | 11 | 0.63 | 2008 |