يعرض 1 - 10 نتائج من 27 نتيجة بحث عن '"Becker, Norman"', وقت الاستعلام: 1.37s تنقيح النتائج
  1. 1
    تقرير

    مصطلحات موضوعية: Computer Science - Cryptography and Security

    الوصف: With the increasing prevalence of security incidents, the adoption of deception-based defense strategies has become pivotal in cyber security. This work addresses the challenge of scalability in designing honeytokens, a key component of such defense mechanisms. The manual creation of honeytokens is a tedious task. Although automated generators exists, they often lack versatility, being specialized for specific types of honeytokens, and heavily rely on suitable training datasets. To overcome these limitations, this work systematically investigates the approach of utilizing Large Language Models (LLMs) to create a variety of honeytokens. Out of the seven different honeytoken types created in this work, such as configuration files, databases, and log files, two were used to evaluate the optimal prompt. The generation of robots.txt files and honeywords was used to systematically test 210 different prompt structures, based on 16 prompt building blocks. Furthermore, all honeytokens were tested across different state-of-the-art LLMs to assess the varying performance of different models. Prompts performing optimally on one LLMs do not necessarily generalize well to another. Honeywords generated by GPT-3.5 were found to be less distinguishable from real passwords compared to previous methods of automated honeyword generation. Overall, the findings of this work demonstrate that generic LLMs are capable of creating a wide array of honeytokens using the presented prompt structures.
    Comment: 12 pages

  2. 2
    تقرير

    المؤلفون: Reti, Daniel, Becker, Norman

    المصدر: 2020 Workshop on Next Generation Networks and Applications (NGNA)

    الوصف: In the field of network security, the concept of honeypots is well established in research as well as in production. Honeypots are used to imitate a legitimate target on the network and to raise an alert on any interaction. This does not only help learning about a breach, but also allows researchers to study the techniques of an attacker. With the rise of cloud computing, container-based virtualization gained popularity for application deployment. This paper investigates the possibilities of container-based honeypots and introduces the concept of simulating container escapes as a deception technique.

  3. 3
    دورية أكاديمية
  4. 4
  5. 5
    كتاب إلكتروني

    الوصف: This book focuses on the current political and security issues with the U.S. and Kenya relations. The U.S. government views Kenya as a strategic partner and anchor state in East Africa, and as critical to counterterrorism efforts in the region. Kenya has repeatedly been a target of terrorist attacks, and, as the September 2013 attack on an upscale Nairobi shopping mall underscores, terrorist threats against international and domestic targets in Kenya remain a serious concern. Kenya has enjoyed a long history of economic leadership in East Africa as the largest and most advanced economy in the region. However, ethnically-charged post-election violence left approximately 1,200 dead and 600,000 displaced, causeing many to reassess Kenya's investment climate. This book discusses the serious concerns regarding corruption and governance in Kenya while also exploring neighboring countries, which have maintained higher growth rates and more political stability.

    المؤلفون: Becker, Norman C.

    نوع المادة: eBook.

    الموضوعات: International relations

  6. 6
    دورية أكاديمية

    المؤلفون: Becker, Norman W.

    المصدر: Change, 1977 Aug 01. 9(8), 5-58.

  7. 7
    دورية أكاديمية
  8. 8
    كتاب إلكتروني

    الوصف: Includes index.

    المؤلفون: Becker, Norman

    نوع المادة: eBook.

    الموضوعات: Dwellings--Inspection

    تصنيفات: HOUSE & HOME / General

  9. 9
    دورية أكاديمية
  10. 10
    دورية أكاديمية

    المصدر: Journal of Dental Research; Jun1957, Vol. 36 Issue 3, p343-348, 6p, 4 Charts, 2 Graphs

    مصطلحات موضوعية: VITAMIN B1, AMYLASES, SALIVA, DENTAL caries, DENTISTRY

    مستخلص: The article discusses the effect of thiamine on the acid production and dextrinizing time of salivary amylase. A study was conducted using children aged 4-12 both with dental caries and without. Saliva samples from the children had corn starch added and then a drop was placed upon a filter paper treated with potassium iodide. A drop of hydrogen peroxide was then added and the color observed under a fluorescent lamp. It was found that thiamine speeds up the dextrinizing time.