Attack Intention Recognition: A Review
Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has...
| Main Authors: | Ahmed, Abdulghani Ali, Noorul Ahlami, Kamarul Zaman |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
IJNS
2017
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/14396/ http://umpir.ump.edu.my/id/eprint/14396/1/Attack%20Intention%20Recognition-%20A%20Review.pdf http://umpir.ump.edu.my/id/eprint/14396/7/Attack%20Intention%20Recognition-%20A%20Review.pdf |
Similar Items
AIRSE : an approach for attack intention recognition based on similarity of evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018)
by: Ahmed, Abdulghani Ali
Published: (2018)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2018)
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A sequential handwriting recognition model based on a dynamically configurable CRNN
by: Al-Saffar, Ahmed, et al.
Published: (2021)
by: Al-Saffar, Ahmed, et al.
Published: (2021)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
Expert System of Heart Attack Prediction
by: Kayalvily, Tabianan, et al.
Published: (2019)
by: Kayalvily, Tabianan, et al.
Published: (2019)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
A review on type of attacks on fingerprint image and watermarking techniques
by: Lebcir, Mohamed, et al.
Published: (2019)
by: Lebcir, Mohamed, et al.
Published: (2019)
Epilepsy detection using EEG signals
by: Amer, Salam, et al.
Published: (2018)
by: Amer, Salam, et al.
Published: (2018)
Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns
by: Chan, Gaik Yee, et al.
Published: (2016)
by: Chan, Gaik Yee, et al.
Published: (2016)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
In-building facial recognition check-in system
by: Yong, Li Jonn
Published: (2023)
by: Yong, Li Jonn
Published: (2023)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Investment decisions based on EEG emotion recognition
by: Mat Razi, Nurul Izzati, et al.
Published: (2017)
by: Mat Razi, Nurul Izzati, et al.
Published: (2017)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Similar Items
-
AIRSE : an approach for attack intention recognition based on similarity of evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017) -
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019) -
SAIRF: A similarity approach for attack intention recognition using fuzzy min-max neural network
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)