Sciweavers

17 search results - page 3 / 4
» Hidden Markov Model Modeling of SSH Brute-Force Attacks
Sort
View
ICRA
2006
IEEE
202views Robotics» more  ICRA 2006»
13 years 11 months ago
Primitive Communication based on Motion Recognition and Generation with Hierarchical Mimesis Model
— Communication skill is essential for social robots in various environments such as homes, offices, and hospitals, where the robots are expected to interact with humans. In thi...
Wataru Takano, Katsu Yamane, Tomomichi Sugihara, K...
IEEEIAS
2007
IEEE
13 years 11 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
DSN
2006
IEEE
13 years 9 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
JMLR
2010
185views more  JMLR 2010»
13 years 2 days ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
CCS
2005
ACM
13 years 10 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar