Sciweavers

935 search results - page 101 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
ISCAPDCS
2004
13 years 10 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
14 years 3 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
WCNC
2010
IEEE
14 years 28 days ago
A Comparison between Stand-Alone and Distributed Architectures for Spectrum Hole Detection
Abstract—In this paper two different cognitive radio architectures, i.e. stand-alone and distributed, are proposed for spectrum sensing purposes. In particular, both architecture...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...
ACSAC
1999
IEEE
14 years 1 months ago
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning
This paper discusses the Address Resolution Protocol (ARP) and the problem of ARP cache poisoning. ARP cache poisoning is the malicious act, by a host in a LAN, of introducing a s...
Mahesh V. Tripunitara, Partha Dutta