Sciweavers

935 search results - page 116 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
IPPS
2008
IEEE
14 years 4 months ago
High-speed string searching against large dictionaries on the Cell/B.E. Processor
Our digital universe is growing, creating exploding amounts of data which need to be searched, protected and filtered. String searching is at the core of the tools we use to curb...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
CSFW
2007
IEEE
14 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
IWIA
2005
IEEE
14 years 3 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
BMCBI
2007
136views more  BMCBI 2007»
13 years 10 months ago
Comparison of protein structures by growing neighborhood alignments
Background: Design of protein structure comparison algorithm is an important research issue, having far reaching implications. In this article, we describe a protein structure com...
Sourangshu Bhattacharya, Chiranjib Bhattacharyya, ...
VTC
2007
IEEE
149views Communications» more  VTC 2007»
14 years 4 months ago
An Iterative Detection Aided Irregular Convolutional Coded Wavelet Videophone Scheme Using Reversible Variable-Length Codes and
— In this paper, we characterize the achievable performance of a wavelet encoding-based videophone system, which further compresses and protects the wavelet-based video codec’s...
Anh Quang Pham, Jin Wang, Lie-Liang Yang, Lajos Ha...