Attack patterns

Results: 58



#Item
1

2016 IEEE International Conference on Software Science, Technology and Engineering Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis Ariel Bar, Bracha Shapi

Add to Reading List

Source URL: cyber.bgu.ac.il

Language: English - Date: 2017-10-26 13:42:18
    2

    Attack Surface Reduction for Web Services based on Authorization Patterns Roland Steinegger, Johannes Schäfer, Max Vogler, and Sebastian Abeck Research Group Cooperation & Management (C&M) Karlsruhe Institute of Technol

    Add to Reading List

    Source URL: cm.tm.kit.edu

    Language: English - Date: 2015-09-11 10:04:13
      3Computational linguistics / Linguistics / Applied linguistics / Computer security / Cryptography / Word-sense disambiguation / Password / Security / Part-of-speech tagging / WordNet / Natural language processing / Dictionary attack

      On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

      Add to Reading List

      Source URL: vialab.science.uoit.ca

      Language: English - Date: 2015-09-22 16:31:59
      4D12 / Eminem / Dice / D3 road

      Resplendent in silks and hennaed patterns, radiant Some chart results also alter the attack dice. Those with gilded hooves and tusks, the animals are led marked with + indicate one die higher up the into the amphitheater

      Add to Reading List

      Source URL: city-of-brass.org

      Language: English - Date: 2010-12-18 12:02:15
      5Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

      Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

      Add to Reading List

      Source URL: peerj.com

      Language: English - Date: 2015-10-07 04:49:41
      6IP address / Transmission Control Protocol / Computing / Cyberwarfare / Application firewall / Computer security / Attack patterns

      Poster: An Automatic Multi-Step Attack Pattern Mining Approach for Massive WAF Alert Data Yang Zhang1,2 , Tingwen Liu1,2 , Jinqiao Shi1,2 , Panpan Zhang1,2 , Haoliang Zhang1,2 , Jing Ya1,2 1 Institute of Information Eng

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:24
      7Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Code injection / Cyberwarfare / Computer security / Computing

      Microsoft Word - tcm_taxonomy_submission.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2006-09-13 14:57:23
      8Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

      CWECWE/SANS Top 25 Most Dangerous Software Errors

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2012-09-25 15:14:33
      9Alert messaging / Cluster analysis / Attack patterns / Computer cluster / Computing / Statistics / Alert correlation

      Alert Correlation through Triggering Events and Common Resources ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:25:57
      10Shark attack / Shark / Atlantic tarpon / Bull shark / Fish / Sharks / Carcharhinidae

      A Comparison of Spatial and Movement Patterns between Sympatric Predators: Bull Sharks (Carcharhinus leucas) and Atlantic Tarpon (Megalops atlanticus) Neil Hammerschlag1,2,3*, Jiangang Luo1, Duncan J. Irschick4, Jerald S

      Add to Reading List

      Source URL: femar.rsmas.miami.edu

      Language: English - Date: 2013-09-19 11:51:30
      UPDATE