Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(32 citation statements)
references
References 1 publication
0
28
0
Order By: Relevance
“…Investigating IDS to mitigate the increase of computer crimes will be effective to reduce loss due to theft and help maintaining the integrity of personal and financial data [14][56]. IDS do have advantages and disadvantages that relate to the effectiveness of its functionalities and its abilities to perform successfully to prevent and thwart current and future attacks [12]. There are known problems that identify and emphasize on those issues by analyzing existing systems with known flaws because they cannot be easily replaced, the difficulty of developing secured systems, and understanding that those so-called secured systems are still vulnerable to inside malicious activities including human errors [35].…”
Section: Ids Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Investigating IDS to mitigate the increase of computer crimes will be effective to reduce loss due to theft and help maintaining the integrity of personal and financial data [14][56]. IDS do have advantages and disadvantages that relate to the effectiveness of its functionalities and its abilities to perform successfully to prevent and thwart current and future attacks [12]. There are known problems that identify and emphasize on those issues by analyzing existing systems with known flaws because they cannot be easily replaced, the difficulty of developing secured systems, and understanding that those so-called secured systems are still vulnerable to inside malicious activities including human errors [35].…”
Section: Ids Problemsmentioning
confidence: 99%
“…As an example, web applications are essential tools for e-commerce and e-banking for they require the transmission of information required for payment [10][12]. Hackers gained profitable and unlawful profits in retrieving such communication medium for obvious and malicious financial reasons in most cases [12]. There is still a disconnection in the research community to propose a more elaborated IDS to tackle its failed properties [49].…”
Section: Secured System Developmentmentioning
confidence: 99%
“…To avoid detection current malware designer employ code obfuscation techniques such as polymorphism and metamorphism [59,60]. It is therefore not easy to offer purely distinct classification of malware in IoT networks based on mode of propagation and form of existence only.…”
Section: Malware Definition and Characterizationmentioning
confidence: 99%
“…There are many methods adopted by malicious authors in order to evade from the detection engines [37] [38]. For every signature created, a new evasion technique can be developed as the malicious authors take advantage of the rich language provided by SQL to fool and thwart the signature based detection.…”
Section: Evasion Methodsmentioning
confidence: 99%