Computer Sciences

A new feature selection technique for intrusion detection systems

Network-based technologies have become increasingly widespread, and they are now being used by countless individuals, professionals, and businesses worldwide. Despite their advantages, most network-based systems are highly ...

Computer Sciences

Predator and prey in cyber stasis

In the world of cybersecurity, just as in nature, there are predators and there is prey. The predators are the hunters, the ones that seek out the weak and the vulnerable on which to prey, that applies whether we are talking ...

Security

Weaponizing the internet for terrorism

Terrorism is a fact of life as are the collectives and networks to which counter-terrorism organizations and the media have given various labels and names. These networks are well versed in exploiting modern information technology ...