Sciweavers

319 search results - page 33 / 64
» A Compound Intrusion Detection Model
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
Bradley Stephenson, Biplab Sikdar
APPROX
2004
Springer
88views Algorithms» more  APPROX 2004»
14 years 29 days ago
A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes
Abstract. Motivated by an open problem recently suggested by Goldreich et al., we study truthful implementations of a random binary function supporting compound XOR queries over su...
Andrej Bogdanov, Hoeteck Wee
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 7 months ago
Fast Histograms using Adaptive CUDA Streams
Histograms are widely used in medical imaging, network intrusion detection, packet analysis and other streambased high throughput applications. However, while porting such software...
Sisir Koppaka, Dheevatsa Mudigere, Srihari Narasim...
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 1 months ago
E-Risk Management through Self Insurance: An Option Model
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Arunabha Mukhopadhyay, Binay Bhushan, Debashis Sah...