Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures | 0 | 0.34 | 2021 |
SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories | 0 | 0.34 | 2021 |
Explainability and Adversarial Robustness for RNNs | 2 | 0.41 | 2020 |
Cross-Layer Profiling of Encrypted Network Data for Anomaly Detection | 0 | 0.34 | 2020 |
SparseIDS: Learning Packet Sampling with Reinforcement Learning | 0 | 0.34 | 2020 |
Interpretability and Refinement of Clustering | 0 | 0.34 | 2020 |
MDCStream: Stream Data Generator for Testing Analysis Algorithms | 0 | 0.34 | 2020 |
SDOstream - Low-Density Models for Streaming Outlier Detection. | 0 | 0.34 | 2020 |
Anomaly Detection for Mixed Packet Sequences | 0 | 0.34 | 2020 |
LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning | 0 | 0.34 | 2020 |
Absolute Cluster Validity | 3 | 0.39 | 2020 |
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection | 0 | 0.34 | 2020 |
Why are My Flows Different? A Tutorial on Flow Exporters | 0 | 0.34 | 2020 |
Are Network Attacks Outliers? A Study of Space Representations and Unsupervised Algorithms. | 0 | 0.34 | 2019 |
BeaconBlocks: Augmenting Proof-of-Stake with On-Chain Time Synchronization | 1 | 0.63 | 2019 |
MDCGen: Multidimensional Dataset Generator for Clustering | 3 | 0.40 | 2019 |
Fuzzy classification boundaries against adversarial network attacks | 1 | 0.35 | 2019 |
Rax: Deep Reinforcement Learning for Congestion Control | 2 | 0.37 | 2019 |
Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types | 0 | 0.34 | 2019 |
Cocoa - Congestion Control Aware Queuing. | 0 | 0.34 | 2019 |
Pattern Discovery in Internet Background Radiation | 1 | 0.35 | 2019 |
Walling up Backdoors in Intrusion Detection Systems. | 1 | 0.36 | 2019 |
Outlier Detection Based On Low Density Models | 1 | 0.35 | 2018 |
ChainChannels: Private Botnet Communication Over Public Blockchains | 1 | 0.40 | 2018 |
Malware propagation in smart grid monocultures. | 0 | 0.34 | 2018 |
Subliminal Channels in High-Speed Signatures. | 0 | 0.34 | 2018 |
Cyber-Physical Systems - Security. | 0 | 0.34 | 2018 |
Encryption is Futile: Delay Attacks on High-Precision Clock Synchronization. | 0 | 0.34 | 2018 |
Network-Based Secret Communication in Clouds: A Survey. | 2 | 0.37 | 2017 |
Are Network Covert Timing Channels Statistical Anomalies? | 0 | 0.34 | 2017 |
A Meta-Analysis Approach for Feature Selection in Network Traffic Research | 6 | 0.60 | 2017 |
The FUSE testbed: establishing a microgrid for smart grid security experiments. | 0 | 0.34 | 2017 |
A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures. | 0 | 0.34 | 2017 |
Toggle MUX: How X-Optimism Can Lead to Malicious Hardware. | 0 | 0.34 | 2017 |
SecureTime: Secure Multicast Time Synchronization. | 1 | 0.40 | 2017 |
Attack Models for Advanced Persistent Threats in Smart Grid Wide Area Monitoring | 1 | 0.35 | 2017 |
Botnet Communication Patterns. | 8 | 0.52 | 2017 |
Detection and mitigation of cascading failures in interconnected power systems | 0 | 0.34 | 2017 |
Decision Tree Rule Induction for Detecting Covert Timing Channels in TCP/IP Traffic. | 0 | 0.34 | 2017 |
A Network Steganography Lab on Detecting TCP/IP Covert Channels. | 5 | 0.53 | 2016 |
Teaching Network Security With IP Darkspace Data | 5 | 0.62 | 2016 |
Data Integrity Attacks in Smart Grid Wide Area Monitoring. | 1 | 0.37 | 2016 |
Time-activity footprints in IP traffic. | 3 | 0.38 | 2016 |
The Right Time: Reducing Effective End-to-End Delay in Time-Slotted Packet-Switched Networks | 2 | 0.38 | 2016 |
DAT detectors: uncovering TCP/IP covert channels by descriptive analytics. | 1 | 0.35 | 2016 |
Resilience and Security: A Qualitative Survey of Urban Smart Grid Architectures. | 4 | 0.56 | 2016 |
Big-DAMA: Big Data Analytics for Network Traffic Monitoring and Analysis. | 1 | 0.40 | 2016 |
Analysis of network traffic features for anomaly detection | 24 | 0.90 | 2015 |
Entropy-Based Characterization of Internet Background Radiation. | 1 | 0.34 | 2015 |
Representative Delay Measurements (RDM): Facing the Challenge of Modern Networks. | 1 | 0.37 | 2015 |