Searched for: +
(1 - 5 of 5)
document
Kabbara, N. (author), Mwangi, A.W. (author), Gibescu, Madeleine (author), Abedi, A. (author), Stefanov, Alexandru (author), Palensky, P. (author)
As power system's operational technology converges with innovative information and communication technologies, the need for extensive resilience testing for scenarios covering the electrical grid, networking bottlenecks, as well as cyber security threats, become a necessity. This paper proposes a comprehensive, multi-disciplinary simulation...
conference paper 2023
document
Telikani, Akbar (author), Rudbardeh, Nima Esmi (author), Soleymanpour, Shiva (author), Shahbahrami, Asadollah (author), Shen, Jun (author), Gaydadjiev, G. (author), Hassanpour, Reza (author)
A problem with machine learning (ML) techniques for detecting intrusions in the Internet of Things (IoT) is that they are ineffective in the detection of low-frequency intrusions. In addition, as ML models are trained using specific attack categories, they cannot recognize unknown attacks. This article integrates strategies of cost-sensitive...
journal article 2023
document
Vermeer, M. (author), van Eeten, M.J.G. (author), Hernandez Ganan, C. (author)
Notwithstanding the predicted demise of signature-based network monitoring, it is still part of the bedrock of security operations. Rulesets are fundamental to the efficacy of Network Intrusion Detection Systems (NIDS). Yet, they have rarely been studied in production environments. We partner with a Managed Security Service Provider (MSSP) to...
conference paper 2022
document
Hammerschmidt, C.A. (author), Marchal, Samuel (author), State, Radu (author), Pellegrino, G. (author), Verwer, S.E. (author)
The task of network traffic monitoring has evolved drastically with the ever-increasing amount of data flowing in large scale networks. The automated analysis of this tremendous source of information often comes with using simpler models on aggregated data (e.g. IP flow records) due to time and space constraints. A step towards utilizing IP flow...
conference paper 2016
document
Sourdis, I. (author)
This dissertation deals with essential issues pertaining to high performance processing for network security and deep packet inspection. The proposed solutions keep pace with the increasing number and complexity of known attack descriptions providing multi-Gbps processing rates. We advocate the use of reconfigurable hardware to provide...
doctoral thesis 2007
Searched for: +
(1 - 5 of 5)