Buscar
Mostrando ítems 41-46 de 46
Open repository for the evaluation of ransomware detection tools
(IEEE, 2020)
info:eu-repo/semantics/article,
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of ...
Ransomware encrypted your files but you restored them from network traffic
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
In a scenario where user files are stored in a network shared volume, a single computer infected by ransomware could encrypt the whole set of shared files, with a large impact on user productivity. On the other hand, medium ...
Online classification of user activities using machine learning on network traffic
(Elsevier, 2020)
info:eu-repo/semantics/article,
The daily deployment of new applications, along with the exponential increase in network traffic, entails a growth in the complexity of network analysis and monitoring. Conversely, the increasing availability and decreasing ...
Validation of HTTP response time from network traffic as an alternative to web browser instrumentation
(IEEE, 2021)
info:eu-repo/semantics/article,
The measurement of response time in hypertext transfer protocol (HTTP) requests is the most basic proxy measurement method for evaluating web browsing quality. It is used in the research literature and in application ...
A survey on detection techniques for cryptographic ransomware
(IEEE, 2019)
info:eu-repo/semantics/article,
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both companies and residential users, ...
Effective analysis of secure web response time
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
The measurement of response time in web based applications is a common task for the evaluation of service responsiveness and the detection of network or server problems. Traffic analysis is the most common strategy for ...