Search
Now showing items 1-4 of 4
Undecidable Problems in Malware Analysis
(IEEE, 2017)
Malware analysis is a challenging task in the theory as well as the practice of computer science. Many important problems in malware analysis have been shown to be undecidable. These problems include virus detection, ...
Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs
(IEEE, 2015)
One of the the most propitious enablers of the Smart Grid paradigm, and a rather low-hanging fruit, is Demand Response (DR) programs. DR is a set of courses of actions to reach and maintain the supply-demand equilibrium ...
An Analysis DRDoS Amplifiers in Europe
(International Conference on Cyber Security and Computer Science, 2018-10)
DRDoS is the new method of choice for denial of service attacks: Certain services running over UDP is chosen for the attack. Servers across the Internet are contacted by bots with the spoofed IP address of the victim host. ...
Evasion Techniques Efficiency over the IPS/IDS Technology
(Institute of Electrical and Electronics Engineers Inc., 2019-09)
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of the defense of cyber-environment. This technology is made for capturing and preventing breaches and attacks. Evading of ...