Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis
Denial-of-Service (DoS) attacks pose a threat to any service provider on the internet. While traditional DoS flooding attacks require the attacker to control at least as much resources as the service provider in order to be effective, so-called low-rate ...
Cyber-Deception and Attribution in Capture-the-Flag Exercises
Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome ...
Real-time monitoring of Twitter traffic by using semantic networks
Data from Social Networks and microblogs can provide useful information for prevention and investigation purposes, provided unstructured information is processed at both the lexical and the semantic level. The proposed methodology introduces a ...
Index Terms
- Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ASONAM '23 | 145 | 53 | 37% |
ASONAM '21 | 118 | 22 | 19% |
ASONAM '19 | 286 | 41 | 14% |
Overall | 549 | 116 | 21% |