Sciweavers

1437 search results - page 128 / 288
» Content Extraction Signatures
Sort
View
HOTI
2005
IEEE
15 years 8 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
SAC
2004
ACM
15 years 8 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
WECWIS
2003
IEEE
125views ECommerce» more  WECWIS 2003»
15 years 7 months ago
A Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security ...
Seokwon Yang, Stanley Y. W. Su, Herman Lam
127
Voted
IEEEMSP
2002
IEEE
125views Multimedia» more  IEEEMSP 2002»
15 years 7 months ago
Wireless multimedia error resilience via a data hiding technique
Abstract—Transmission of digital contents in unavoidable noiseprone environments demands sophisticated error detection and concealment techniques to restore the perceptual qualit...
Chun-Shien Lu
JSAC
2006
163views more  JSAC 2006»
15 years 2 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood