Sciweavers

1424 search results - page 52 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
JNCA
2006
86views more  JNCA 2006»
13 years 8 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 1 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
SENSYS
2004
ACM
14 years 1 months ago
Hardware design experiences in ZebraNet
The enormous potential for wireless sensor networks to make a positive impact on our society has spawned a great deal of research on the topic, and this research is now producing ...
Pei Zhang, Christopher M. Sadler, Stephen A. Lyon,...
IJRR
2006
95views more  IJRR 2006»
13 years 8 months ago
Experiments with a Large Heterogeneous Mobile Robot Team: Exploration, Mapping, Deployment and Detection
We describe the design and experimental validation of a large heterogeneous mobile robot team built for the DARPA Software for Distributed Robotics (SDR) program. The core challen...
Andrew Howard, Lynne E. Parker, Gaurav S. Sukhatme