Sciweavers

935 search results - page 65 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
TOOLS
1999
IEEE
14 years 3 hour ago
Automatic Detection of Design Problems in Object-Oriented Reengineering
The evolution of software systems over many years often leads to unnecessarily complex and in exible designs which in turn lead to a huge amount of e ort for enhancements and main...
Oliver Ciupke
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
13 years 12 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
CJ
2004
93views more  CJ 2004»
13 years 7 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
ARC
2010
Springer
177views Hardware» more  ARC 2010»
14 years 2 months ago
An FPGA-Based Real-Time Event Sampler
This paper presents the design and FPGA-implementation of a sampler that is suited for sampling real-time events in embedded systems. Such sampling is useful, for example, to test ...
Niels Penneman, Luc Perneel, Martin Timmerman, Bjo...
KBSE
2007
IEEE
14 years 2 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr