Detection of operating system vulnerabilities and network traffic analysis methods
Researchers and experts on information protection develop antivirus programs and applications to improve the security of operating systems and security policies. Threats will be relevant to organizations that do not consider security policies and regular software updates. This paper discusses applic...
| Main Authors: | Makulova, A., Sharipova, B., Othman, M., Pyrkova, A., Оrdabayeva, G. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Al-farabi Kazakh State National University
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/113401/ http://psasir.upm.edu.my/id/eprint/113401/1/113401.pdf |
Similar Items
Vulnerability Detection System (Xposed)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
Smart monitoring fault detection system for malfunction traffic light operation.
by: Che Soh, Azura, et al.
Published: (2013)
by: Che Soh, Azura, et al.
Published: (2013)
Detection of vulnerability attack through wireless network on android platform
by: Muhamad Izhan Fakri, Imran
Published: (2014)
by: Muhamad Izhan Fakri, Imran
Published: (2014)
Siren songs: a novel sonification method for network
traffic and intrusion detection
by: Skarth-Hayley, Luke
Published: (2017)
by: Skarth-Hayley, Luke
Published: (2017)
Vulnerability analysis on the network security by using Nessus
by: Hamid Ali, Firkhan Ali
Published: (2004)
by: Hamid Ali, Firkhan Ali
Published: (2004)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Vulnerable Road Users Detection using Convolutional Deep
Feedforward Network
by: Lau, Mian Mian
Published: (2021)
by: Lau, Mian Mian
Published: (2021)
Detecting critical nodes for network vulnerability assessment under cascading failures
by: Hu, Shi Ming, et al.
Published: (2017)
by: Hu, Shi Ming, et al.
Published: (2017)
Detecting the urban traffic network structure dynamics through the growth and analysis of multi-layer networks
by: Ding, Rui, et al.
Published: (2018)
by: Ding, Rui, et al.
Published: (2018)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
An interface of wireless network traffic analysis
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021)
by: Hazim, Hanif, et al.
Published: (2021)
Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
by: Ahmed, Abdulghani Ali, et al.
Published: (2015)
An Analysis of Traffic Incidents on an Australian Urban Road Network
by: Hojati, A.T, et al.
Published: (2011)
by: Hojati, A.T, et al.
Published: (2011)
Vulnerability assessment modelling for railway networks
by: Meesit, R., et al.
Published: (2018)
by: Meesit, R., et al.
Published: (2018)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
Traffic analysis for QoS provisioning in Bluetooth ad hoc network
by: H., Hasbullah, et al.
Published: (2008)
by: H., Hasbullah, et al.
Published: (2008)
Traffic light fault detection system
by: Che Soh, Azura, et al.
Published: (2002)
by: Che Soh, Azura, et al.
Published: (2002)
Traffic intensity monitoring using multiple object detection
with traffic surveillance cameras
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2017)
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2017)
Impact of minerals freight and logistic operation towards traffic safety in Kuantan road network
by: Nik Noranis Syazlin, Nik Abd Razak
Published: (2019)
by: Nik Noranis Syazlin, Nik Abd Razak
Published: (2019)
Traffic intensity monitoring using multiple object detection with traffic surveillance cameras
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2017)
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2017)
Of meat, men and property: the troubled career of a convert nun in eighteenth-century Kiev
by: Sharipova, Liudmyla
Published: (2017)
by: Sharipova, Liudmyla
Published: (2017)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Granger causality analysis on PLUS highway traffic network
by: Mohd Asrah, Norhaidah, et al.
Published: (2018)
by: Mohd Asrah, Norhaidah, et al.
Published: (2018)
Seismic vulnerability analysis of various types of dams with finite element methods
by: Farsangi, Ehsan Noroozinejad
Published: (2010)
by: Farsangi, Ehsan Noroozinejad
Published: (2010)
Traffic burden at Skudai Toll Plaza: an analysis using complex network
by: M. Asrah, N., et al.
Published: (2018)
by: M. Asrah, N., et al.
Published: (2018)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Video detection system for traffic Iight sensor
by: Rahmat, Riza Atiq, et al.
Published: (2001)
by: Rahmat, Riza Atiq, et al.
Published: (2001)
Traffic flow forecasting neural networks based on exponential smoothing method
by: Chan, Kit Yan, et al.
Published: (2011)
by: Chan, Kit Yan, et al.
Published: (2011)
Development of vehicle detection and counting system for traffic analysis using computer vision
by: Saw, Kenny Wei Wen
Published: (2024)
by: Saw, Kenny Wei Wen
Published: (2024)
Clustering network traffic utilization
by: Mohd Khairudin, Nazli, et al.
Published: (2013)
by: Mohd Khairudin, Nazli, et al.
Published: (2013)
Analyzing the instructions vulnerability of dense convolutional network on GPUS
by: Khalid, Adam, et al.
Published: (2021)
by: Khalid, Adam, et al.
Published: (2021)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
An analysis of traffic-flow stability in a microscopic heterogeneous network
by: Peursum, Sarah, et al.
Published: (2013)
by: Peursum, Sarah, et al.
Published: (2013)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
The evaluation of traffic operation based on travel time study
by: Guanning, Xu
Published: (2014)
by: Guanning, Xu
Published: (2014)
Reliability Of Rapid Penang Operation In Mixed Traffic Situation
by: Paid, Norazilah Mohamed
Published: (2017)
by: Paid, Norazilah Mohamed
Published: (2017)
Simulation model of traffic operations on single carriageway roads: Model calibrationand validation
by: Zamri, Bujang, et al.
Published: (2017)
by: Zamri, Bujang, et al.
Published: (2017)
Similar Items
-
Vulnerability Detection System (Xposed)
by: Nurin Azyyati, Kamilizahri
Published: (2023) -
Smart monitoring fault detection system for malfunction traffic light operation.
by: Che Soh, Azura, et al.
Published: (2013) -
Detection of vulnerability attack through wireless network on android platform
by: Muhamad Izhan Fakri, Imran
Published: (2014) -
Siren songs: a novel sonification method for network
traffic and intrusion detection
by: Skarth-Hayley, Luke
Published: (2017) -
Vulnerability analysis on the network security by using Nessus
by: Hamid Ali, Firkhan Ali
Published: (2004)