Bou-Harb et al., 2013
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US10721243B2 (en) | Apparatus, system and method for identifying and mitigating malicious network threats | |
| Bou-Harb et al. | On fingerprinting probing activities | |
| Bou-Harb et al. | A statistical approach for fingerprinting probing activities | |
| KR102501372B1 (en) | AI-based mysterious symptom intrusion detection and system | |
| US20230403296A1 (en) | Analyses and aggregation of domain behavior for email threat detection by a cyber security system | |
| Hunt et al. | Network forensics: an analysis of techniques, tools, and trends | |
| Ling et al. | TorWard: Discovery of malicious traffic over Tor | |
| JP2020521383A (en) | Correlation-driven threat assessment and remediation | |
| Elejla et al. | Intrusion detection systems of ICMPv6-based DDoS attacks | |
| Mangino et al. | Internet-scale insecurity of consumer internet of things: An empirical measurements perspective | |
| Fachkha et al. | Investigating the dark cyberspace: Profiling, threat-based analysis and correlation | |
| Hu et al. | RB-Seeker: Auto-detection of Redirection Botnets. | |
| Ghafir et al. | DNS query failure and algorithmically generated domain-flux detection | |
| Bou-Harb et al. | Multidimensional investigation of source port 0 probing | |
| Bou-Harb et al. | A systematic approach for detecting and clustering distributed cyber scanning | |
| Haddadi et al. | DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment | |
| Gupta et al. | Detecting attacks in high-speed networks: Issues and solutions | |
| Griffioen et al. | Have you syn me? characterizing ten years of internet scanning | |
| Fukuda et al. | Detecting malicious activity with DNS backscatter | |
| Bou-Harb et al. | A time series approach for inferring orchestrated probing campaigns by analyzing darknet traffic | |
| Drašar et al. | Similarity as a central approach to flow‐based anomaly detection | |
| Simon et al. | Scan detection: A data mining approach | |
| Kidmose et al. | Detection of malicious and abusive domain names | |
| Qureshi et al. | Analysis of challenges in modern network forensic framework | |
| Anbar et al. | Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS) |