Search results
-
-
Title
-
Active Cyber Defense Planning and Orchestration
-
Author
-
Islam, Md Mazharul
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
The overwhelming number of recent data breaches reported that hundreds of terabytes of highly sensitive information, including national, financial, and personal, have been stolen from different organizations, indicating a clear asymmetric disadvan...
-
-
Title
-
Advances in Modern Botnet Understanding and the Accurate Enumeration of Infected Hosts
-
Author
-
Nunnery, Christopher
-
Date Created
-
2011
-
Subjects--Topical
-
Information technology, Information science
-
Description
-
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to ...
-
-
Title
-
Autonomous Malware Deception and Orchestration
-
Author
-
Sajid, Md Sajidul Islam
-
Date Created
-
2023
-
Subjects--Topical
-
Computer science, Computer engineering
-
Description
-
Traditional approaches to cyber defense lack the agility to effectively counter stealthy and undetectable attacks, placing defenders at a disadvantage. In response to this imbalance, Active Cyber Deception (ACD) has emerged as a promising solution...
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
ESIDE: The integration of secure programming education into the IDE
-
Author
-
Whitney, Michael
-
Date Created
-
2015
-
Subjects--Topical
-
Computer science
-
Description
-
Securing the world's technological resources has become one of the largest challenges of modern day. From healthcare to national security, power grids to public safety, the world is reliant on computer systems and their ability to perform in a saf...
-
-
Title
-
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
-
Author
-
Alsaleh, Mohammed Noraden
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
As cyber vulnerability and complexity increases, cyber attacks become highly sophisticated and inevitable. Therefore, cyber resilience is necessary to make cyber capable of misleading attackers in reaching their goals, resisting their progress, an...
-
-
Title
-
HIJaX - Human Intent To JavaScript XSS Generator
-
Author
-
Frempong, Yaw
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
Websites remain popular targets for Cross-Site Scripting (XSS) attacks. Although the prevalence of XSS attacks is on the rise, many developers do not have the cybersecurity expertise to secure their web applications against these attacks. Non-secu...