[go: up one dir, main page]

Corona et al., 2009 - Google Patents

Information fusion for computer security: State of the art and open issues

Corona et al., 2009

View PDF
Document ID
7525068830291701444
Author
Corona I
Giacinto G
Mazzariello C
Roli F
Sansone C
Publication year
Publication venue
Information Fusion

External Links

Snippet

In this paper, we critically review the issue of information fusion for computer security, both in terms of problem formulation and in terms of state-of-the-art solutions. We also analyze main strengths and weaknesses of currently used approaches and propose some research issues …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems

Similar Documents

Publication Publication Date Title
Corona et al. Information fusion for computer security: State of the art and open issues
Kumar et al. A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing
Santhosh Kumar et al. A comprehensive survey on machine learning‐based intrusion detection systems for secure communication in internet of things
Hindy et al. A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
Navaz et al. Entropy based anomaly detection system to prevent DDoS attacks in cloud
Boukhamla et al. CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed
Hajj et al. Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
Bijone A survey on secure network: intrusion detection & prevention approaches
Friedberg et al. Combating advanced persistent threats: From network event correlation to incident detection
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
García et al. Survey on network‐based botnet detection methods
Meng et al. Collaborative security: A survey and taxonomy
Devi et al. Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments
Rizvi et al. Application of artificial intelligence to network forensics: Survey, challenges and future directions
Yeo et al. Understanding modern intrusion detection systems: a survey
Mangrulkar et al. Network attacks and their detection mechanisms: A review
Razak A study on IDS for preventing Denial of Service attack using outliers techniques
Qin et al. Symmetry degree measurement and its applications to anomaly detection
Haddadi et al. Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?
Grana et al. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
Meijerink Anomaly-based detection of lateral movement in a microsoft windows environment
Rastogi et al. Network anomalies detection using statistical technique: a chi-square approach
Savola et al. Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system
Alzahrani et al. [Retracted] Computational Intelligence Approaches in Developing Cyberattack Detection System
Laabid Botnet command & control detection in iot networks