• TDDAD

  • Referenced in 1 article [sw38851]
  • network is trained to extract an attack pattern and used to recognize an attack. Then...
  • Privado

  • Referenced in 1 article [sw32567]
  • inside enclaves are vulnerable to access pattern based attacks. We show that by simply observing ... access patterns, an attacker can classify encrypted inputs with 97% and 71% attack accuracy ... free of input-dependent access patterns thus eliminating the leakage. PRIVADO is fully-automated...
  • PCAV

  • Referenced in 2 articles [sw02612]
  • fact that numerous types of attacks form a specific pattern of graphs, we have developed ... graphical signatures, PCAV can quickly detect new attacks and enables network administrators to instantly recognize...
  • VOT4CS

  • Referenced in 1 article [sw31721]
  • randomization that aim to confuse attacks based on pattern recognition. An evaluation of VOT4CS...
  • VisFlowConnect

  • Referenced in 3 articles [sw21753]
  • traffic patterns. Some of these were harmless, normal behavior, but some were malicious attacks against...
  • Flowfence

  • Referenced in 0 articles [sw38852]
  • Denial of Service (DoS) attacks intend to generate a traffic pattern that is indistinguishable from...
  • BotGraph

  • Referenced in 4 articles [sw21754]
  • huge volumes of data to identify abnormal patterns or activities. The emergence of cloud-computing ... detect a new type of botnet spamming attacks targeting major Web email providers. Bot-Graph...
  • Cujo

  • Referenced in 1 article [sw37812]
  • detection and prevention of drive-by-download attacks. Embedded in a web proxy, Cujo transparently ... analysed for malicious patterns using efficient techniques of machine learning. We demonstrate the efficacy ... work on detection of drive-by-download attacks...
  • BotMiner

  • Referenced in 5 articles [sw21748]
  • platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft ... hosts that share both similar communication patterns and similar malicious activity patterns. These hosts...
  • CyGraph

  • Referenced in 1 article [sw22314]
  • best courses of action for responding to attacks. For postattack forensics, it shows vulnerable paths ... domain-specific query language for expressing graph patterns of interest, with interactive visualization of query...
  • SeLINQ

  • Referenced in 2 articles [sw28379]
  • root cause for confidentiality and integrity attacks against computing systems is insecure information flow ... treatment of algebraic data types and pattern matching, and establish its soundness. On the practical...
  • Devign

  • Referenced in 1 article [sw40145]
  • crucial to protect the software systems from attacks for cyber security. It is especially important ... Inspired by the work on manually-defined patterns of vulnerabilities from various code representation graphs...
  • CARRADS

  • Referenced in 1 article [sw00106]
  • detection system at real-time to new attacks and changing network conditions is critical ... task is to identify occurrence of new patterns in the routing control traffic and prioritize...
  • POISED

  • Referenced in 1 article [sw30723]
  • content of these messages. However, advanced attackers can still successfully evade these defenses. Online social ... other hand, follow different spreading patterns. In this paper, we follow this insight and present ... against two well-known adversarial machine learning attacks...
  • NodeMerge

  • Referenced in 1 article [sw39053]
  • point, and from there identify previously unknown attack steps. However, one major challenge for causality ... only file events based on their access patterns. It can either reduce the storage cost...
  • SmartCheck

  • Referenced in 0 articles [sw37692]
  • hostile execution environment, where anonymous attackers exploit bugs for immediate financial gain. Developers have ... intermediate representation and checks it against XPath patterns. We evaluated our tool...
  • Coq

  • Referenced in 1856 articles [sw00161]
  • Coq is a formal proof management system. It...
  • GAP

  • Referenced in 3068 articles [sw00320]
  • GAP is a system for computational discrete algebra...
  • M4RI

  • Referenced in 19 articles [sw00534]
  • M4RI is a library for fast arithmetic with...
  • Macaulay2

  • Referenced in 1841 articles [sw00537]
  • Macaulay2 is a software system devoted to supporting...