Sciweavers

1424 search results - page 75 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
USS
2004
13 years 9 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
IV
2010
IEEE
150views Visualization» more  IV 2010»
13 years 6 months ago
Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design
Despite the growing number of systems providing visual analytic support for investigative analysis, few empirical studies include investigations on the analytical reasoning proces...
Maria Riveiro, Göran Falkman
DAC
1994
ACM
14 years 7 days ago
Fitting Formal Methods into the Design Cycle
This tutorial introduces several methods of formal hardware veri cation that could potentially have a practical impact on the design process. The measure of success in integrating...
Kenneth L. McMillan
HOST
2009
IEEE
13 years 12 months ago
New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
Hardware Trojans in integrated circuits and systems have become serious concern to fabless semiconductor industry and government agencies in recent years. Most of the previously p...
Hassan Salmani, Mohammad Tehranipoor, Jim Plusquel...
ACSAC
2009
IEEE
14 years 3 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar