You are currently on the new version of our website. Access the old version .

1,200 Results Found

  • Article
  • Open Access
70 Citations
11,829 Views
16 Pages

On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks

  • Jesús Díaz-Verdejo,
  • Javier Muñoz-Calle,
  • Antonio Estepa Alonso,
  • Rafael Estepa Alonso and
  • Germán Madinabeitia

14 January 2022

Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have...

  • Review
  • Open Access
640 Views
18 Pages

25 November 2025

The Aho-Corasick (AC) algorithm remains one of the most influential developments in deterministic multi-pattern matching due to its ability to recognize multiple strings in linear time within a single data stream. Originally conceived for bibliograph...

  • Article
  • Open Access
20 Citations
10,104 Views
16 Pages

Defacement attacks have long been considered one of prime threats to websites and web applications of companies, enterprises, and government organizations. Defacement attacks can bring serious consequences to owners of websites, including immediate i...

  • Article
  • Open Access
11 Citations
4,712 Views
26 Pages

14 March 2024

Over the last few years, a plethora of papers presenting machine-learning-based approaches for intrusion detection have been published. However, the majority of those papers do not compare their results with a proper baseline of a signature-based int...

  • Article
  • Open Access
7 Citations
7,778 Views
17 Pages

26 November 2019

A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,0...

  • Article
  • Open Access
5 Citations
1,890 Views
24 Pages

Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol

  • Mohammad Emran Hashimyar,
  • Mahdi Aiash,
  • Ali Khoshkholghi and
  • Giacomo Nalli

17 February 2025

The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities. However, its increasing adoption has made it a target for various cyber threats, includi...

  • Review
  • Open Access
37 Citations
25,721 Views
44 Pages

The rapid growth of digital communications and extensive data exchange have made computer networks integral to organizational operations. However, this increased connectivity has also expanded the attack surface, introducing significant security risk...

  • Article
  • Open Access
67 Citations
10,693 Views
19 Pages

Recently, devices in real-time systems, such as residential facilities, vehicles, factories, and social infrastructure, have been increasingly connected to communication networks. Although these devices provide administrative convenience and enable t...

  • Article
  • Open Access
5 Citations
4,453 Views
18 Pages

A Comparison of the Music Key Detection Approaches Utilizing Key-Profiles with a New Method Based on the Signature of Fifths

  • Michalina Kania,
  • Tomasz Łukaszewicz,
  • Dariusz Kania,
  • Katarzyna Mościńska and
  • Józef Kulisz

7 November 2022

This paper compares approaches to music key detection based on popular key-profiles with a new key detection method that utilizes the concept of the signature of fifths. The signature of fifths is a geometrical music harmonic-content descriptor. Depe...

  • Feature Paper
  • Article
  • Open Access
13 Citations
5,049 Views
26 Pages

SAGMAD—A Signature Agnostic Malware Detection System Based on Binary Visualisation and Fuzzy Sets

  • Betty Saridou,
  • Joseph Ryan Rose,
  • Stavros Shiaeles and
  • Basil Papadopoulos

Image conversion of byte-level data, or binary visualisation, is a relevant approach to security applications interested in malicious activity detection. However, in practice, binary visualisation has always been seen to have great limitations when d...

  • Article
  • Open Access
36 Citations
4,767 Views
16 Pages

16 September 2019

To realize the accurate fault detection of rolling element bearings, a novel fault detection method based on non-stationary vibration signal analysis using weighted average ensemble empirical mode decomposition (WAEEMD) and modulation signal bispectr...

  • Feature Paper
  • Article
  • Open Access
53 Citations
7,855 Views
28 Pages

Motor Current Signature Analysis-Based Permanent Magnet Synchronous Motor Demagnetization Characterization and Detection

  • Manel Krichen,
  • Elhoussin Elbouchikhi,
  • Naourez Benhadj,
  • Mohamed Chaieb,
  • Mohamed Benbouzid and
  • Rafik Neji

Neodymium-boron (NdFeB) permanent magnets (PMs) have been widely studied in the past years since they became the material of choice in permanent magnet synchronous machines (PMSMs). Although NdFeB PMs have a better energy density than other types of...

  • Article
  • Open Access
4 Citations
5,849 Views
43 Pages

21 July 2022

Design patterns are common solutions to existing issues in software engineering. In recent decades, design patterns have been researched intensively because they increase the quality factors of software systems such as flexibility, maintainability, a...

  • Article
  • Open Access
5 Citations
3,971 Views
20 Pages

Soft error is a key challenge in computer systems. Without soft error mitigation, control flow error (CFE) can lead to system crash. Signature-based CFE monitoring scheme is a representative technique for detecting CFEs during runtime. However, most...

  • Article
  • Open Access
60 Citations
4,589 Views
24 Pages

An Anomaly Mitigation Framework for IoT Using Fog Computing

  • Muhammad Aminu Lawal,
  • Riaz Ahmed Shaikh and
  • Syed Raheel Hassan

24 September 2020

The advancement in IoT has prompted its application in areas such as smart homes, smart cities, etc., and this has aided its exponential growth. However, alongside this development, IoT networks are experiencing a rise in security challenges such as...

  • Article
  • Open Access
9 Citations
4,133 Views
20 Pages

Micro-Doppler Signature Detection and Recognition of UAVs Based on OMP Algorithm

  • Shiqi Fan,
  • Ziyan Wu,
  • Wenqiang Xu,
  • Jiabao Zhu and
  • Gangyi Tu

15 September 2023

With the proliferation of unmanned aerial vehicles (UAVs) in both commercial and military use, the public is paying increasing attention to UAV identification and regulation. The micro-Doppler characteristics of a UAV can reflect its structure and mo...

  • Article
  • Open Access
18 Citations
2,804 Views
14 Pages

A Multivariate Statistics-Based Approach for Detecting Diesel Engine Faults with Weak Signatures

  • Jinxin Wang,
  • Chi Zhang,
  • Xiuzhen Ma,
  • Zhongwei Wang,
  • Yuandong Xu and
  • Robert Cattley

17 February 2020

The problem of timely detecting the engine faults that make engine operating parameters exceed their control limits has been well-solved. However, in practice, a fault of a diesel engine can be present with weak signatures, with the parameters fluctu...

  • Article
  • Open Access
8 Citations
4,442 Views
25 Pages

Impact of Dataset Size on the Signature-Based Calibration of a Hydrological Model

  • Safa A. Mohammed,
  • Dimitri P. Solomatine,
  • Markus Hrachowitz and
  • Mohamed A. Hamouda

31 March 2021

Many calibrated hydrological models are inconsistent with the behavioral functions of catchments and do not fully represent the catchments’ underlying processes despite their seemingly adequate performance, if measured by traditional statistical erro...

  • Article
  • Open Access
8 Citations
8,047 Views
21 Pages

New Asia Dust Storm Detection Method Based on the Thermal Infrared Spectral Signature

  • Hui Xu,
  • Tianhai Cheng,
  • Xingfa Gu,
  • Tao Yu,
  • Yu Wu and
  • Hao Chen

23 December 2014

As hyperspectral instruments can provide the detailed spectral information, a new spectral similarity method for detecting and differentiating dust from non-dust scenes using the Atmospheric Infrared Sounder (AIRS) observations has been developed. Th...

  • Article
  • Open Access
2 Citations
2,005 Views
19 Pages

Wear Detection of Extruder Elements Based on Current Signature by Means of a Continuous Wavelet Transform

  • Marek Danielak,
  • Kamil Witaszek,
  • Adam Ekielski,
  • Tomasz Żelaziński,
  • Alla Dudnyk and
  • Karol Durczak

17 November 2023

Assessing the wear of components in a single-screw extruder and its condition during the process is difficult. In this context, wavelet analysis was used to investigate the wear condition of extruder elements, which yielded data on current waveforms...

  • Article
  • Open Access
105 Citations
11,355 Views
11 Pages

In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection Sy...

  • Article
  • Open Access
33 Citations
6,418 Views
14 Pages

11 March 2021

Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of vari...

  • Article
  • Open Access
4 Citations
2,303 Views
25 Pages

11 May 2024

The detection of subsurface archaeological remains using a range of remote sensing methods poses several challenges. Recent studies regarding the detection of archaeological proxies like those of cropmarks highlight the complexity of the phenomenon....

  • Article
  • Open Access
1,312 Views
23 Pages

23 April 2024

This contribution focuses on the detection of tracer particles within non-homogeneous bulk media, aiming to enhance insights into particulate systems. Polarimetric radar measurements are employed, utilizing cross-polarizing channels in order to mitig...

  • Article
  • Open Access
23 Citations
5,603 Views
18 Pages

Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection

  • Mário Antunes,
  • Luís Oliveira,
  • Afonso Seguro,
  • João Veríssimo,
  • Ruben Salgado and
  • Tiago Murteira

Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerab...

  • Article
  • Open Access
11 Citations
9,139 Views
12 Pages

2 March 2017

Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non‐trivial task. In such a dynamic system, the use of a...

  • Article
  • Open Access
40 Citations
11,597 Views
22 Pages

Detection and Modeling of Cyber Attacks with Petri Nets

  • Bartosz Jasiul,
  • Marcin Szpyrka and
  • Joanna Śliwa

19 December 2014

The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of...

  • Article
  • Open Access
65 Views
22 Pages

A Comparative Evaluation of Snort and Suricata for Detecting Data Exfiltration Tunnels in Cloud Environments

  • Mahmoud H. Qutqut,
  • Ali Ahmed,
  • Mustafa K. Taqi,
  • Jordan Abimanyu,
  • Erika Thea Ajes and
  • Fatima Alhaj

Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness i...

  • Article
  • Open Access
9 Citations
3,855 Views
23 Pages

As attack techniques become more sophisticated, detecting new and advanced cyberattacks with traditional intrusion detection techniques based on signature and anomaly is becoming challenging. In signature-based detection, not only do attackers bypass...

  • Article
  • Open Access
1 Citations
524 Views
12 Pages

Confirmatory Clinical Validation of a Serum-Based Biomarker Signature for Detection of Early-Stage Pancreatic Ductal Adenocarcinoma

  • Patricio M. Polanco,
  • Tamas Gonda,
  • Erkut Borazanci,
  • Evan S. Glazer,
  • Jose G. Trevino,
  • George DeMuth,
  • Lisa Ford,
  • Thomas King,
  • Norma A. Palma and
  • Randall E. Brand

13 November 2025

Early detection of pancreatic ductal adenocarcinoma (PDAC) could extend patient survival, and biomarkers to facilitate this are urgently needed. Here, we performed a second independent validation of PancreaSure, a 5-plex serum biomarker signature to...

  • Article
  • Open Access
7 Citations
3,260 Views
24 Pages

CBFISKD: A Combinatorial-Based Fuzzy Inference System for Keylogger Detection

  • Femi Emmanuel Ayo,
  • Joseph Bamidele Awotunde,
  • Olasupo Ahmed Olalekan,
  • Agbotiname Lucky Imoize,
  • Chun-Ta Li and
  • Cheng-Chi Lee

17 April 2023

A keylogger is a type of spyware that records keystrokes from the user’s keyboard to steal confidential information. The problems with most keylogger methods are the lack of simulated keylogger patterns, the failure to maintain a database of cu...

  • Article
  • Open Access
39 Citations
6,145 Views
17 Pages

The swift embrace of Industry 4.0 paradigms has led to the growing convergence of Information Technology (IT) networks and Operational Technology (OT) networks. Traditionally isolated on air-gapped and fully trusted networks, OT networks are now beco...

  • Article
  • Open Access
4 Citations
3,470 Views
12 Pages

Nanosensor-Enabled Detection and Identification of Intracellular Bacterial Infections in Macrophages

  • Aritra Nath Chattopadhyay,
  • Mingdi Jiang,
  • Jessa Marie V. Makabenta,
  • Jungmi Park,
  • Yingying Geng and
  • Vincent Rotello

25 July 2024

Opportunistic bacterial pathogens can evade the immune response by residing and reproducing within host immune cells, including macrophages. These intracellular infections provide reservoirs for pathogens that enhance the progression of infections an...

  • Article
  • Open Access
6 Citations
3,801 Views
20 Pages

Detecting Web-Based Attacks with SHAP and Tree Ensemble Machine Learning Methods

  • Samuel Ndichu,
  • Sangwook Kim,
  • Seiichi Ozawa,
  • Tao Ban,
  • Takeshi Takahashi and
  • Daisuke Inoue

22 December 2021

Attacks using Uniform Resource Locators (URLs) and their JavaScript (JS) code content to perpetrate malicious activities on the Internet are rampant and continuously evolving. Methods such as blocklisting, client honeypots, domain reputation inspecti...

  • Article
  • Open Access
31 Citations
4,678 Views
22 Pages

1 March 2019

This study investigates the feasibility of impedance-based stress monitoring method for local-strand breakage detection in multi-strand anchorage systems. Firstly, stress fields of a multi-strand anchorage system are numerically analyzed to examine a...

  • Article
  • Open Access
6 Citations
2,099 Views
16 Pages

Modeling of Improved Sine Cosine Algorithm with Optimal Deep Learning-Enabled Security Solution

  • Latifah Almuqren,
  • Mohammed Maray,
  • Sumayh S. Aljameel,
  • Randa Allafi and
  • Amani A. Alneil

3 October 2023

Artificial intelligence (AI) acts as a vital part of enhancing network security using intrusion detection and anomaly detection. These AI-driven approaches have become essential components of modern cybersecurity strategies. Conventional IDS is based...

  • Article
  • Open Access
38 Citations
15,267 Views
15 Pages

27 May 2020

Signature verification is one of the biometric techniques frequently used for personal identification. In many commercial scenarios, such as bank check payment, the signature verification process is based on human examination of a single known sample...

  • Article
  • Open Access
15 Citations
7,593 Views
20 Pages

Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection

  • Giacomo Iadarola,
  • Fabio Martinelli,
  • Francesco Mercaldo and
  • Antonella Santone

10 November 2020

The increasing diffusion of mobile devices, widely used for critical tasks such as the transmission of sensitive and private information, corresponds to an increasing need for methods to detect malicious actions that can undermine our data. As demons...

  • Article
  • Open Access
20 Citations
5,968 Views
21 Pages

6 February 2021

More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Int...

  • Article
  • Open Access
2,699 Views
46 Pages

28 October 2025

Zero-day attacks pose unprecedented challenges to modern cybersecurity frameworks, exploiting unknown vulnerabilities that evade traditional signature-based detection systems. This paper presents ZeroDay-LLM, a novel large language model framework sp...

  • Article
  • Open Access
3 Citations
2,355 Views
30 Pages

7 October 2022

The safe and efficient function of critical national infrastructure (CNI) relies on the accurate demand forecast. Cyber-physical system-based demand forecasting systems (CDFS), typically found in CNI (such as energy, water, and transport), are highly...

  • Article
  • Open Access
143 Citations
65,916 Views
11 Pages

3 November 2022

One of the most significant issues facing internet users nowadays is malware. Polymorphic malware is a new type of malicious software that is more adaptable than previous generations of viruses. Polymorphic malware constantly modifies its signature t...

  • Article
  • Open Access
15 Citations
3,851 Views
16 Pages

Deep Learning Multi-Class Approach for Human Fall Detection Based on Doppler Signatures

  • Jorge D. Cardenas,
  • Carlos A. Gutierrez and
  • Ruth Aguilar-Ponce

Falling events are a global health concern with short- and long-term physical and psychological implications, especially for the elderly population. This work aims to monitor human activity in an indoor environment and recognize falling events withou...

  • Article
  • Open Access
1,378 Views
20 Pages

18 September 2025

Over the last 15 years, cyberattacks have moved from attacking IT systems to targeted attacks on Operational Technology (OT) systems, also known as Cyber–Physical Systems (CPS). The first targeted OT cyberattack was Stuxnet in 2010, at which ti...

  • Article
  • Open Access
19 Citations
6,144 Views
19 Pages

7 August 2020

Exploring strategies to treat cancer has always been an aim of medical researchers. One of the available strategies is to use targeted therapy drugs to make the chromosomes in cancer cells unstable such that cell death can be induced, and the elimina...

  • Article
  • Open Access
4 Citations
3,709 Views
18 Pages

Evaluation of Survivability of the Automatically Obfuscated Android Malware

  • Himanshu Patel,
  • Deep Patel,
  • Jaspreet Ahluwalia,
  • Vaishali Kapoor,
  • Karthik Narasimhan,
  • Harmanpreet Singh,
  • Harmanjot Kaur,
  • Gadi Harshitha Reddy,
  • Sai Sushma Peruboina and
  • Sergey Butakov

14 May 2022

Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware...

  • Proceeding Paper
  • Open Access
6 Citations
2,296 Views
7 Pages

Feature-Based Semi-Supervised Learning Approach to Android Malware Detection

  • Mariam Memon,
  • Adil Ahmed Unar,
  • Syed Saad Ahmed,
  • Ghulam Hussain Daudpoto and
  • Rabeea Jaffari

The development of signature-based methods or Machine Learning (ML) techniques on static data has dominated automated malware detection on android platforms. However, these techniques may not detect dangerous activities that only manifest during runt...

  • Article
  • Open Access
1,119 Views
14 Pages

31 October 2025

Identifying malware families is vital for predicting attack campaigns and creating effective defense strategies. Traditional signature-based methods are insufficient against new and evasive malware, highlighting the need for adaptive, multimodal solu...

  • Proceeding Paper
  • Open Access
2,967 Views
9 Pages

Static Malware Detection and Classification Using Machine Learning: A Random Forest Approach

  • Kamdan,
  • Yoga Pratama,
  • Rifki Sariful Munzi,
  • Aqshal Bilnandzari Mustafa and
  • Ivana Lucia Kharisma

9 September 2025

Malware remains one of the most critical threats in the digital ecosystem, targeting both mobile and desktop platforms. Traditional signature-based detection techniques face limitations in identifying polymorphic and zero-day variants. This study pro...

  • Article
  • Open Access
6 Citations
5,919 Views
23 Pages

27 December 2022

Banking malware are malicious programs that attempt to steal confidential information, such as banking authentication credentials, from users. Zeus is one of the most widespread banking malware variants ever discovered. Since the Zeus source code was...

of 24