5 Hits in 6.5 sec

A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers

Chaeyeon Oh, Joonseo Ha, Heejun Roh
2021 Applied Sciences  
To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios  ...  Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis  ...  Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, 3rd ed.; No Starch Press: San Francisco, CA, USA, 2017. 77. Collins, M.  ... 
doi:10.3390/app12010155 fatcat:kdkvmdkbareb7cxgy7er7ncday

Linear Scalability of Distributed Applications

Nicolas Bonvin
In Proceedings of the 2nd conference on Real, Large Distributed Systems - Volume 2, WORLDS05, pages 1–6, Berkeley, CA, USA, 2005. USENIX Association. [59] D. Agrawal and A. E. Abbadi.  ...  Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2005. [105] R. J. Honicky and E. L. Miller. A fast algorithm for online placement and reorganization of replicated data.  ... 
doi:10.5075/epfl-thesis-5278 fatcat:cqwluzkzojgozb362zlaxt3z4e

Results of SEI Independent Research and Development Projects FY 2006

Christopher J. Alberts, William B. Anderson, Len Bass, Matthew Bass, Philip Boxer, Lisa Brownsword, Sagar Chaki, Peter H. Feiler, David Fisher, Eileen C. Forrester, Suzanne Garcia-Miller, Aaron Greenhouse (+15 others)
This report describes the IRAD projects that were conducted during fiscal year 2006 (October 2005 through September 2006).  ...  Projects are chosen based on their potential to mature and/or transition software engineering practices, develop information that will help in deciding whether further work is worth funding, and set new  ...  San Francisco, CA (USA): Jossey-Bass, 1992. [Stallinger 2001] Stallinger, F. & Grunbacher, P. "System Dynamics Modelling and Simulation of Collaborative Requirements Engineering."  ... 
doi:10.1184/r1/6583376 fatcat:kszugi3fzbdk5mm4t7pqepgxfm

ICAS 2013 Committee ICAS Advisory Chairs ICAS 2013 Technical Program Committee

Lisbon, Michael Bauer, Michael Grottke, Bruno Dillenseger, Michael Bauer, Michael Grottke, Bruno Dillenseger, Jemal Abawajy, Javier Alonso, Richard Anthony, Tsz-Chiu Au, Mark Balas (+72 others)
in Lisbon, Portugal, was a multi-track event covering related topics on theory and practice on systems automation, autonomous systems and autonomic computing.  ...  We aimed to expose specific advancements on theory and tool in supporting advanced autonomous systems.  ...  Berkeley, CA, USA: USENIX Association, 2010, pp. 3-3. [39] S. Crosby and D. Brown, "The virtualization reality," in ACM Q focus: computer architecture, 2006, pp. 34 -41.  ... 

Cyber Power and the International System

Shawn William Lonergan
paper, "Cyber Power and International Stability: Assessing Deterrence and Escalation in Cyberspace," posits that there are unique attributes that define the cyber domain and that have direct implications on  ...  The second paper, "Arms Control and Confidence Building Measures for the Cyber Domain," explores at various mechanisms that states have traditionally used to foster stability and prevent inadvertent conflict  ...  Acknowledgements This dissertation greatly benefited from the writings, teachings, and guidance of Richard Betts and Robert Jervis, who served on my dissertation committee.  ... 
doi:10.7916/d88d07ph fatcat:7vqzfgghwzfrbepl2lytb7dnti