Sciweavers

323 search results - page 29 / 65
» Alert Detection in System Logs
Sort
View
DSN
2006
IEEE
14 years 2 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
CSREASAM
2006
13 years 10 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
ACSAC
2002
IEEE
14 years 1 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
PERCOM
2008
ACM
14 years 2 months ago
WAITER: A Wearable Personal Healthcare and Emergency Aid System
The emerging pervasive computing is regarded as a promising solution to the systems of personal healthcare and emergency aid, which can monitor personal health status in a real-ti...
Wanhong Wu, Jiannong Cao, Yuan Zheng, Yong-Ping Zh...
AISM
2004
13 years 10 months ago
SOHO Wireless Intrusion Detection Systems - Cure or Placebo
Growth of wireless home networking solutions has meant that household computers are now not just connected to the Internet and each other but to passers-by on the street. It is th...
Peter Wolski