Sciweavers

1317 search results - page 68 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
KBSE
2005
IEEE
15 years 10 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
15 years 8 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
JNW
2006
142views more  JNW 2006»
15 years 4 months ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood
DAGM
2001
Springer
15 years 9 months ago
A New Contour-Based Approach to Object Recognition for Assembly Line Robots
A complete processing chain for visual object recognition is described in this paper. The system automatically detects individual objects on an assembly line, identifies their typ...
Markus Suing, Lothar Hermes, Joachim M. Buhmann
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 10 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen