Πλοήγηση ανά Θέμα "Computer crime"
Αποτελέσματα 1-2 από 2
-
Conference Object
Detection of collaborative cyber-attacks through correlation and time dependency analysis
(Institute of Electrical and Electronics Engineers Inc., 2016)In this paper, we consider the detection of suspiciously high correlation between malicious Internet users that are collaborating in order to cause a Denial of Service (DoS) Attack. The main goal is to recognise cyber ...
-
Article
Graphical inference for multiple intrusion detection
(2008)In this paper, we consider vulnerabilities of networked systems and develop a multiple intrusion detection system (MIDS) which operates by running belief propagation on an appropriately constructed weighted bipartite graph. ...