Sciweavers

935 search results - page 64 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
FPL
2000
Springer
96views Hardware» more  FPL 2000»
13 years 11 months ago
Generation of Design Suggestions for Coarse-Grain Reconfigurable Architectures
Coarse-grain reconfigurable architectures have been a matter of intense research in the last few years. They promise to be more adequate for computational tasks due to their better...
Reiner W. Hartenstein, Michael Herz, Thomas Hoffma...
SAC
2009
ACM
14 years 2 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
IEEEARES
2006
IEEE
14 years 1 months ago
Securing DNS Services through System Self Cleansing and Hardware Enhancements
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
Yih Huang, David Arsenault, Arun Sood
DOA
2001
97views more  DOA 2001»
13 years 9 months ago
Transparent Dynamic Reconfiguration for CORBA
Distributed systems with high availability requirements have to support some form of dynamic reconfiguration. This means that they must provide the ability to be maintained or upg...
João Paulo A. Almeida, Maarten Wegdam, Mart...
CEC
2007
IEEE
14 years 2 months ago
AIS for misbehavior detection in wireless sensor networks: Performance and design principles
— A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices are expected to operate autonomously, be batte...
Martin Drozda, Sven Schaust, Helena Szczerbicka