↓ Skip to main content

Research in Attacks, Intrusions, and Defenses

Overview of attention for book
Cover of 'Research in Attacks, Intrusions, and Defenses'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Proteus: Detecting Android Emulators from Instruction-Level Profiles
  3. Altmetric Badge
    Chapter 2 BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews
  4. Altmetric Badge
    Chapter 3 Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer
  5. Altmetric Badge
    Chapter 4 Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails
  6. Altmetric Badge
    Chapter 5 Backdoors: Definition, Deniability and Detection
  7. Altmetric Badge
    Chapter 6 RWGuard: A Real-Time Detection System Against Cryptographic Ransomware
  8. Altmetric Badge
    Chapter 7 DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives
  9. Altmetric Badge
    Chapter 8 Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures
  10. Altmetric Badge
    Chapter 9 Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids
  11. Altmetric Badge
    Chapter 10 Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum
  12. Altmetric Badge
    Chapter 11 SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels
  13. Altmetric Badge
    Chapter 12 GuidedPass: Helping Users to Create Strong and Memorable Passwords
  14. Altmetric Badge
    Chapter 13 Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
  15. Altmetric Badge
    Chapter 14 Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic
  16. Altmetric Badge
    Chapter 15 OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine
  17. Altmetric Badge
    Chapter 16 Hardware Assisted Randomization of Data
  18. Altmetric Badge
    Chapter 17 MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation
  19. Altmetric Badge
    Chapter 18 CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices
  20. Altmetric Badge
    Chapter 19 PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning
  21. Altmetric Badge
    Chapter 20 $$\tau $$ CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries
  22. Altmetric Badge
    Chapter 21 Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data
  23. Altmetric Badge
    Chapter 22 Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence
  24. Altmetric Badge
    Chapter 23 Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
  25. Altmetric Badge
    Chapter 24 Next Generation P2P Botnets: Monitoring Under Adverse Conditions
  26. Altmetric Badge
    Chapter 25 Malicious IoT Implants: Tampering with Serial Communication over the Internet
  27. Altmetric Badge
    Chapter 26 Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape
  28. Altmetric Badge
    Chapter 27 Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances
  29. Altmetric Badge
    Chapter 28 PostScript Undead: Pwning the Web with a 35 Years Old Language
  30. Altmetric Badge
    Chapter 29 Identifying Key Leakage of Bitcoin Users
  31. Altmetric Badge
    Chapter 30 Furnace: Self-service Tenant VMI for the Cloud
  32. Altmetric Badge
    Chapter 31 ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation
  33. Altmetric Badge
    Chapter 32 KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
Attention for Chapter 27: Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances
Altmetric Badge


6 Dimensions

Readers on

18 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances
Chapter number 27
Book title
Research in Attacks, Intrusions, and Defenses
Published by
Springer, Cham, September 2018
DOI 10.1007/978-3-030-00470-5_27
Book ISBNs
978-3-03-000469-9, 978-3-03-000470-5

Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim, Yun, Jeong-Han, Hwang, Yoonho, Lee, Woomyo, Ahn, Hee-Kap, Kim, Sin-Kyu

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 18 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 18 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 3 17%
Professor > Associate Professor 2 11%
Student > Ph. D. Student 2 11%
Lecturer 1 6%
Student > Doctoral Student 1 6%
Other 3 17%
Unknown 6 33%
Readers by discipline Count As %
Computer Science 9 50%
Unspecified 1 6%
Engineering 1 6%
Unknown 7 39%