Sciweavers

360 search results - page 7 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
SCAM
2002
IEEE
14 years 24 days ago
Semantics Guided Filtering of Combinatorial Graph Transformations in Declarative Equation-Based Languages
This paper concerns the use of static analysis for debugging purposes of declarative object-oriented equation-based modeling languages. We propose a framework where over- and unde...
Peter Bunus, Peter Fritzson
ACSAC
2003
IEEE
13 years 11 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
COMPSAC
2007
IEEE
13 years 11 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 2 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
APIN
2007
80views more  APIN 2007»
13 years 8 months ago
Specification, analysis and simulation of the dynamics within an organisation
In this paper a modelling approach to the dynamics within a multi-agent organisation is presented. A declarative, executable specification language for dynamics within an organisat...
Catholijn M. Jonker, Jan Treur, Wouter C. A. Wijng...