Sciweavers

1424 search results - page 48 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
AOSD
2011
ACM
13 years 3 months ago
Experiences documenting and preserving software constraints using aspects
Software systems are increasingly being built as compositions of reusable artifacts (components, frameworks, toolkits, plug-ins, APIs, etc) that have non-trivial usage constraints...
Roberto Silveira Silva Filho, François Bron...
IPPS
2006
IEEE
14 years 2 months ago
A nonself space approach to network anomaly detection
The paper presents an approach for the anomaly detection problem based on principles of immune systems. Flexibility and efficiency of the anomaly detection system are achieved by ...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
CN
2007
168views more  CN 2007»
13 years 8 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
ICRA
2006
IEEE
91views Robotics» more  ICRA 2006»
14 years 2 months ago
Design, Development and Experiments of a High Stroke-precision 2DoF (Linear-angular) Microsystem
— This paper presents the design, the development and the experiments on a two degrees of freedom (2DoF) microsystem. The originality of the microsystem is its ability to do angu...
Micky Rakotondrabe, Yassine Haddab, Philippe Lutz
WSE
2006
IEEE
14 years 2 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...