Covert channel analysis and detection using reverse proxy servers.
Presentation / Conference
Buchanan, W. J., & Llamas, D. (2004, June)
Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC), London
Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls...
An agent-based Bayesian method for network intrusion detection.
Thesis
Pikoulas, J. (2003)
An agent-based Bayesian method for network intrusion detection. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4057
Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting...
An intelligent agent security intrusion system
Conference Proceeding
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002)
An intelligent agent security intrusion system. In Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems. , (94-99). https://doi.org/10.1109/ecbs.2002.999827
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly secu...
An agent based Bayesian forecasting model for enhanced network security.
Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...
Speed improvements for the RSA encryption method
Thesis
Wang, H. (2000)
Speed improvements for the RSA encryption method. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4065
This thesis presents methods that can be used to improve the operation of the RSA encryption method. It shows the principles of encryption, and then expands this to give the o...