Filters








11 Hits in 7.0 sec

A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers

Chaeyeon Oh, Joonseo Ha, Heejun Roh
2021 Applied Sciences  
Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis  ...  In addition, we have discussed the state-of-the-art methods in TLS-encrypted NTA for each component of a machine learning pipeline, typically used in the state-of-the-art methods.  ...  In Proceedings of the 31st USENIX Security Symposium (USENIX Security), Boston, MA, USA, 10–12 August 2022.  ... 
doi:10.3390/app12010155 fatcat:kdkvmdkbareb7cxgy7er7ncday

ВОПРОСЫ БЕЗОПАСНОСТИ ПРИ ОРГАНИЗАЦИИ ЗАЩИТЫ СИСТЕМЫ ЭЛЕКТРОННЫХ ПЛАТЕЖЕЙ

Глеб Николаевич Мальцев, Игорь Вениаминович Прохоров
2009 Bezopasnostʹ Informacionnyh Tehnologij  
This article views main questions of payment systems security, including two aspects: possible attacks on users and security vulnerability of systems architecture.  ...  In the article was performed an analysis of delays in a processing of users requests on different levels such as application servers and database in the case of high load traffic.  ...  October 2007. 10. Cui W., Kannan J., Wang H. J. Discoverer: Automatic Protocol Reverse Engineering from Network Traces // Proceedings of the 16th USENIX Security Symposium. Boston, MA.  ... 
doaj:60901051bd8a4cfb84eb2d033863eca8 fatcat:452fhj4bijd4tbqpw4b24noos4

A survey of static analysis methods for identifying security vulnerabilities in software systems

M. Pistoia, S. Chandra, S. J. Fink, E. Yahav
2007 IBM Systems Journal  
Dean, “Setuid Demystified,” Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, USENIX Association (August 2002), pp. 171-190. F. Schneider, G. Morrisett, and R.  ...  Wagner, “Detecting Format String Vulnerabilities with Type Qualifiers,” Proceedings of the 10th USENIX Security Symposium, Washington, DC, USA (August 2001), pp. 201-220. J. S. Foster, T.  ... 
doi:10.1147/sj.462.0265 fatcat:ykcfy2vgdzgllnxprlyyiieaia

Field Programmable Gate Array Applications—A Scientometric Review

Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez, Rahul Khanna
2019 Computation  
Also, we present an evolution and trend analysis of the related applications.  ...  Here we found the top 150 applications that we divided into the following categories: digital control, communication interfaces, networking, computer security, cryptography techniques, machine learning  ...  Security analysis of a cryptographically-enabled RFID device. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, 31 July-5 August 2005. 166. Kavun, E.B.; Yalcin, T.  ... 
doi:10.3390/computation7040063 fatcat:wxtatzsvvnfopghdfl25hcfc2a

A Comprehensive Survey on Sharding in Blockchains

Jinwen Xi, Shihong Zou, Guoai Xu, Yanhui Guo, Yueming Lu, Jiuyun Xu, Xuanwen Zhang, Francesco Gringoli
2021 Mobile Information Systems  
Therefore, based on the three-layer architecture, this study presents a variety of solutions to improve the scalability of the blockchain.  ...  As the scale of the network expands, one of the most practical ways to achieve horizontal scalability is sharding, where the network is divided into multiple subnetworks to avoid repeated communication  ...  the 24th {USENIX}Security Symposium ({USENIX} Security [54] T. Haerder and A. Reuter, “Principles of transaction-oriented 15), pp. 129–144, Washington, DC, USA, August 2015.  ... 
doi:10.1155/2021/5483243 fatcat:x67pir24enadjaauwvbh76dpre

Invalidation-Based Protocols for Replicated Datastores [article]

Antonios Katsarakis
2021 arXiv   pre-print
Meanwhile, the opposite occurs in the world of multiprocessors, where data are replicated across the private caches of different cores.  ...  The primary contribution of this thesis is in adapting invalidating protocols to the nuances of replicated datastores, which include skewed data accesses, fault tolerance, and distributed transactions.  ...  In Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference, WTEC ’94, pages 1010, Berkeley, CA, USA, 1994. USENIX Association.  ... 
arXiv:2112.02405v1 fatcat:toi3wflouvbzngpdfzypw3l4li

[Front cover]

2020 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)  
Symposium (ICTIS) since 2005, and NATO Advanced Research Workshop on Information Security Assurance Co-director, Tetuan, June 3-6, 2005.  ...  He was the co-editor of the book "Information Assurance and Computer Security", IOS Press, 2007.  ... 
doi:10.1109/wf-iot48130.2020.9221244 fatcat:nfrea7jitzh4tpn5k4sg3bsnmq

Invalidation-based protocols for replicated datastores [article]

Antonis Katsarakis, University Of Edinburgh, Boris Grot, Vijayanand Nagarajan, Rik Sarkar
2021
Meanwhile, the opposite occurs in the world of multiprocessors, where data are replicated across the private caches of different cores.  ...  The primary contribution of this thesis is in adapting invalidating protocols to the nuances of replicated datastores, which include skewed data accesses, fault tolerance, and distributed transactions.  ...  In Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference, WTEC ’94, pages 1010, Berkeley, CA, USA, 1994.  ... 
doi:10.7488/era/1639 fatcat:snjzrhkqqnc7dpsfe4gzaskhqa

Results of SEI Independent Research and Development Projects FY 2006

Christopher J. Alberts, William B. Anderson, Len Bass, Matthew Bass, Philip Boxer, Lisa Brownsword, Sagar Chaki, Peter H. Feiler, David Fisher, Eileen C. Forrester, Suzanne Garcia-Miller, Aaron Greenhouse (+15 others)
2018
These projects serve to (1) support feasibility studies investigating whether further work by the SEI would be of potential benefit and (2) support further exploratory work to determine whether there is  ...  sufficient value in eventually funding the feasibility study work as an SEI initiative.  ...  Boston, MA (USA): Addison-Wesley, 2006. [Gray 2005] Gray, D. E. & Gibson, D. "Déjà Vu, Again and Again." Proceedings of the 2005 SEPG (SEPG 2005). Seattle, WA (USA), March 7-10, 2005.  ... 
doi:10.1184/r1/6583376 fatcat:kszugi3fzbdk5mm4t7pqepgxfm

Special Issue: Advances in Network Systems

Andrzej Chojnacki, Andrzej Kowalski, Bohdan Macukow, Maciej Grzenda, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Juan Carlos, Augusto, Argentina (+13 others)
2012 unpublished
To stimulate the cooperation between commercial research community and academia, the first edition of Frontiers in Network Applications and Network Systems symposium was organized in 2012.  ...  The success of WWW applications, API exposition via web services or ubiquitous mobile access is immediately followed by significant challenges related to performance, security, or privacy issues of network  ...  Acknowledgement This work is supported by the Ministry of Education, Youth, and Sport of the Czech Republic -University spec. research -1311.  ... 
fatcat:cawnzh5r35hjzke3tpwe3d2dsu

Transaction and Message: From Database to Marketplace, 1970-2000 [article]

Michael C. Castelle
2018
And parts of Chapter 6, "The Platform as Exchange", previously appeared in Economic Sociology: the European Electronic Newsletter.  ...  employ of the Department of Neurology.  ...  Acknowledgements ix ACKNOWLEDGEMENTS In the Department of Sociology, Ben Merriman always seemed to believe in me even when I didn't, and was a persistent supporter of my work and ideas; I also thank  ... 
doi:10.6082/m1sn0746 fatcat:nrq7epxxuzcplb3wiznue4gani