There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Software development techniques are continuously evolving with the goal of solving the main problems that still affect the building and maintenance of software systems: time, cost...
The correctness of the data managed by database systems is vital to any application that utilizes data for business, research, and decision-making purposes. To guard databases agai...
A semantic sensor network describes the physical world using the metadata obtained from a sensor network. In this paper, we present our design and implementation of MeT, a real wo...