Research explorer tool

7 results

Enhancing intrusion detection via an active target host.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006
Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of netwo...

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

A framework to detect novel computer viruses via system calls.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2005)
A framework to detect novel computer viruses via system calls. In M. Merabti, R. Pereira, & O. Abuelma'atti (Eds.), 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 308-313
This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...

We know where you are [cellular location tracking]

Journal Article
Raja, K., Buchanan, W., & Munoz, J. (2004)
We know where you are [cellular location tracking]. Communications engineer, 2(3), 34-39. doi:10.1049/ce:20040307

Critical analysis and error determination of locating-finding techniques in GSM.

Journal Article
Buchanan, W. J., Raja, A. & Munoz, J. (2005)
Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications. 3, 165-182. doi:10.1504/IJMC.2005.005905. ISSN 1470-949X
GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These t...

Analysis and detection of cruising computer viruses.

Conference Proceeding
Abimbola, A., Munoz, J. & Buchanan, W. J. (2003)
Analysis and detection of cruising computer viruses
Viral propagation is an important phenomenon of computer viruses. This paper focuses on viral movement and proposes the feasibility of a computer virus which is able to target...