Kavindu GunathilakeSecure Authentication with OAuth 2.0 and OpenID Connect for AWS resourcesStreamlining Access and Identity Management in Modern Applications and AWS options to achieve themJun 5, 2023Jun 5, 2023
Dharana RodrigoAdversarial Attacks against Intrusion Detection SystemsThe internet is becoming increasingly populated with new inventions and emerging technologies, expanding the attack surface and allowing…Aug 21, 2021Aug 21, 2021
Kavindu GunathilakeCyber Intrusions — Off-Path AttacksIn computer network security, attackers are classified according to their capabilities. These groups are known as attack models or…Jul 31, 2021Jul 31, 2021
Sadesh SurendraOverview of Intrusion Detection and Prevention SystemIDS vs IPSJul 18, 2021Jul 18, 2021
Seniya SansithWhat is an Intrusion Detection System?"Most computer security experts believe that the vast majority of computer crimes are committed by an organization’s authorized users, its…Jul 15, 2021Jul 15, 2021