Sciweavers

1424 search results - page 34 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 10 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
RAID
2009
Springer
14 years 2 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
COMCOM
2007
149views more  COMCOM 2007»
13 years 7 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
DFT
1998
IEEE
94views VLSI» more  DFT 1998»
14 years 8 days ago
An Integrated HW and SW Fault Injection Environment for Real-Time Systems
This paper describes a system suited to support the Fault Injection process for microprocessor-based embedded systems. The system exploits a low-cost hardware board to monitor the...
Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza R...
EUROPAR
2006
Springer
13 years 11 months ago
Supporting a Real-Time Distributed Intrusion Detection Application on GATES
Increasingly, a number of applications across computer sciences and other science and engineering disciplines rely on, or can potentially benefit from, analysis and monitoring of d...
Qian Zhu, Liang Chen, Gagan Agrawal