Corona et al., 2009 - Google Patents
Information fusion for computer security: State of the art and open issuesCorona et al., 2009
View PDF- Document ID
- 7525068830291701444
- Author
- Corona I
- Giacinto G
- Mazzariello C
- Roli F
- Sansone C
- Publication year
- Publication venue
- Information Fusion
External Links
Snippet
In this paper, we critically review the issue of information fusion for computer security, both in terms of problem formulation and in terms of state-of-the-art solutions. We also analyze main strengths and weaknesses of currently used approaches and propose some research issues …
- 230000004927 fusion 0 title abstract description 93
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Corona et al. | Information fusion for computer security: State of the art and open issues | |
Kumar et al. | A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing | |
Santhosh Kumar et al. | A comprehensive survey on machine learning‐based intrusion detection systems for secure communication in internet of things | |
Hindy et al. | A taxonomy and survey of intrusion detection system design techniques, network threats and datasets | |
Navaz et al. | Entropy based anomaly detection system to prevent DDoS attacks in cloud | |
Boukhamla et al. | CICIDS2017 dataset: performance improvements and validation as a robust intrusion detection system testbed | |
Hajj et al. | Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets | |
Bijone | A survey on secure network: intrusion detection & prevention approaches | |
Friedberg et al. | Combating advanced persistent threats: From network event correlation to incident detection | |
Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
García et al. | Survey on network‐based botnet detection methods | |
Meng et al. | Collaborative security: A survey and taxonomy | |
Devi et al. | Enhancing Cloud Security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments | |
Rizvi et al. | Application of artificial intelligence to network forensics: Survey, challenges and future directions | |
Yeo et al. | Understanding modern intrusion detection systems: a survey | |
Mangrulkar et al. | Network attacks and their detection mechanisms: A review | |
Razak | A study on IDS for preventing Denial of Service attack using outliers techniques | |
Qin et al. | Symmetry degree measurement and its applications to anomaly detection | |
Haddadi et al. | Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform? | |
Grana et al. | A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks | |
Meijerink | Anomaly-based detection of lateral movement in a microsoft windows environment | |
Rastogi et al. | Network anomalies detection using statistical technique: a chi-square approach | |
Savola et al. | Security-measurability-enhancing mechanisms for a distributed adaptive security monitoring system | |
Alzahrani et al. | [Retracted] Computational Intelligence Approaches in Developing Cyberattack Detection System | |
Laabid | Botnet command & control detection in iot networks |