Sciweavers

935 search results - page 55 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
DIMVA
2009
13 years 8 months ago
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...
WORM
2003
13 years 9 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
MAM
2008
150views more  MAM 2008»
13 years 7 months ago
FPGA based string matching for network processing applications
String matching is a key problem in many network processing applications. Current implementations of this process using software are time consuming and cannot meet gigabit bandwid...
Janardhan Singaraju, John A. Chandy
VTC
2010
IEEE
207views Communications» more  VTC 2010»
13 years 6 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
WPES
2006
ACM
14 years 1 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov