Sciweavers

2269 search results - page 329 / 454
» Behavioral Intrusion Detection
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Tracking Darkports for Network Defense
We exploit for defensive purposes the concept of darkports – the unused ports on active systems. We are particularly interested in such ports which transition to become active (...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
SECON
2007
IEEE
14 years 4 months ago
On the Prevalence of Sensor Faults in Real-World Deployments
—Various sensor network measurement studies have reported instances of transient faults in sensor readings. In this work, we seek to answer a simple question: How often are such ...
Abhishek Sharma, Leana Golubchik, Ramesh Govindan
SSDBM
2006
IEEE
121views Database» more  SSDBM 2006»
14 years 4 months ago
Scalability Management in Sensor-Network PhenomenaBases
A phenomenon appears in a sensor network when a group of sensors persist to generate similar behavior over a period of time. PhenomenaBases (or databases of phenomena) are equippe...
Mohamed H. Ali, Walid G. Aref, Ibrahim Kamel
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 5 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...