Buscar
Mostrando ítems 41-46 de 46
High-speed analysis of SMB2 file sharing traffic without TCP stream reconstruction
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
This paper presents a file sharing traffic analysis methodology for Server Message Block (SMB), a common protocol in the corporate environment. The design is focused on improving the traffic analysis rate that can be ...
A survey on detection techniques for cryptographic ransomware
(IEEE, 2019)
info:eu-repo/semantics/article,
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both companies and residential users, ...
Ransomware encrypted your files but you restored them from network traffic
(IEEE, 2019)
info:eu-repo/semantics/conferenceObject,
In a scenario where user files are stored in a network shared volume, a single computer infected by ransomware could encrypt the whole set of shared files, with a large impact on user productivity. On the other hand, medium ...
Validation of HTTP response time from network traffic as an alternative to web browser instrumentation
(IEEE, 2021)
info:eu-repo/semantics/article,
The measurement of response time in hypertext transfer protocol (HTTP) requests is the most basic proxy measurement method for evaluating web browsing quality. It is used in the research literature and in application ...
Open repository for the evaluation of ransomware detection tools
(IEEE, 2020)
info:eu-repo/semantics/article,
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data, and asks for ransom to recover the hijacked documents. Several articles have presented detection techniques for this type of ...
Online classification of user activities using machine learning on network traffic
(Elsevier, 2020)
info:eu-repo/semantics/article,
The daily deployment of new applications, along with the exponential increase in network traffic, entails a growth in the complexity of network analysis and monitoring. Conversely, the increasing availability and decreasing ...