2017
DOI: 10.1016/j.jocs.2017.05.006
|View full text |Cite
|
Sign up to set email alerts
|

Design and evaluation of a system for network threat signatures generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Most of them use relatively simple (computationally inexpensive) heuristic approaches. Another method is defined in [15], where the generation of multi-set signatures is formulated as an optimization problem. A specialized version of the genetic algorithm (GA) is used to solve it.…”
Section: A Signature-based Detection Methods Of 'Known' Attacksmentioning
confidence: 99%
“…Most of them use relatively simple (computationally inexpensive) heuristic approaches. Another method is defined in [15], where the generation of multi-set signatures is formulated as an optimization problem. A specialized version of the genetic algorithm (GA) is used to solve it.…”
Section: A Signature-based Detection Methods Of 'Known' Attacksmentioning
confidence: 99%
“…Daniel Nahmias et al [15] presented TrustSign, a novel, trusted automatic malware signature generation method based on high-level deep features transferred from a VGG-19 neural network model pre-trained on the ImageNet dataset. Paweł Szynkiewicz et al [16] developed an efficient algorithm for token extraction and a novel method for automatic multi-token signature composition. Fangwei Wang et al [17] proposed an automatic signature extraction algorithm for polymorphic worms based on the improved Term Frequency-Inverse Document Frequency (TF-IDF).…”
Section: Related Workmentioning
confidence: 99%
“…In order to perform the aforementioned security functions, system developers rely on a variety of tools to secure CPS. The classification of tools that were presented in [24] ( [25], [26].…”
Section: Cyber-security In Cyber-physical Systemsmentioning
confidence: 99%