Essays about: "Signature Based Detection"
Showing result 1 - 5 of 22 essays containing the words Signature Based Detection.
-
1. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE
-
2. On The Evaluation of District Heating Load Predictions
University essay from Lunds universitet/Institutionen för energivetenskaperAbstract : District Heating is a technology with the potential to enable a fossil-free society. However, to realize this potential, some improvements need to be made in order to improve District Heating operation at large, decrease losses in the systems, and thus increase the competitiveness of District Heating as a technology. READ MORE
-
3. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
4. Comparison and optimization of extracellular vesicle (EV) capturing on functional thin films for their molecular profiling
University essay from KTH/Tillämpad fysikAbstract : Extracellular vesicles (EVs) are lipid bilayer encapsulated nanoparticles which have emerged as an excellent source of biomarkers for multiple diseases, including cancer. However, they are highly heterogeneous in their molecular compositions which remains a major challenge hindering the utilization of their biomarker potential. READ MORE
-
5. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE