Sciweavers

341 search results - page 36 / 69
» A Security Engineering Process based on Patterns
Sort
View
FPL
2005
Springer
137views Hardware» more  FPL 2005»
15 years 8 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk
IEEEARES
2010
IEEE
15 years 7 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
15 years 6 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
CSMR
2004
IEEE
15 years 6 months ago
Empirical Investigation of a Non-Intrusive Approach to Study Comprehension Cognitive Models
Usually software is maintained by people different from those who developed it. In this context the maintenance activities are dominated by the comprehension effort. The study of ...
Marco Torchiano
110
Voted
DISCEX
2003
IEEE
15 years 7 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong