Sciweavers

935 search results - page 38 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 7 months ago
A Rule-based Temporal Alert Correlation System
This paper reports a research work to address the problem of the large number of alerts generated by the detectors in an intrusion detection system. Some of these alerts are redun...
Peyman Kabiri, Ali A. Ghorbani
WETICE
2007
IEEE
14 years 1 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok
WORDS
2005
IEEE
14 years 1 months ago
Functional and Non-Functional Properties in a Family of Embedded Operating Systems
The increasing complexity of embedded systems calls for software design and implementation techniques that support specialization without abandonment of reusability. This brings u...
Daniel Lohmann, Wolfgang Schröder-Preikschat,...
IMC
2006
ACM
14 years 1 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
SISW
2003
IEEE
14 years 28 days ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng