Sciweavers

1278 search results - page 194 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
ICNP
2006
IEEE
14 years 3 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 3 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
BMCBI
2010
129views more  BMCBI 2010»
13 years 9 months ago
Uncovering packaging features of co-regulated modules based on human protein interaction and transcriptional regulatory networks
Background: Network co-regulated modules are believed to have the functionality of packaging multiple biological entities, and can thus be assumed to coordinate many biological fu...
Lina Chen, Hong Wang, Liangcai Zhang, Wan Li, Qian...
CCS
2004
ACM
14 years 2 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
COMSWARE
2006
IEEE
14 years 3 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...