Sciweavers

173 search results - page 28 / 35
» Classification of RFID Attacks
Sort
View
LISA
2008
13 years 10 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
IR
2010
13 years 4 months ago
Sentence-level event classification in unstructured texts
The ability to correctly classify sentences that describe events is an important task for many natural language applications such as Question Answering (QA) and Text Summarisation....
Martina Naughton, Nicola Stokes, Joe Carthy
IEEEIA
2009
13 years 5 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
FI
2010
130views more  FI 2010»
13 years 5 months ago
Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures
: Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown...
Martin Güthle, Jochen Kögel, Stefan Wahl...
CHI
2005
ACM
13 years 9 months ago
Designing human friendly human interaction proofs (HIPs)
HIPs, or Human Interactive Proofs, are challenges meant to be easily solved by humans, while remaining too hard to be economically solved by computers. HIPs are increasingly used ...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...