Sciweavers

1424 search results - page 91 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
DAC
2009
ACM
14 years 3 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
CDC
2008
IEEE
202views Control Systems» more  CDC 2008»
14 years 2 months ago
Integrating human and robot decision-making dynamics with feedback: Models and convergence analysis
— Leveraging research by psychologists on human decision-making, we present a human-robot decision-making problem associated with a complex task and study the corresponding joint...
Ming Cao, Andrew Reed Stewart, Naomi Ehrich Leonar...
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
13 years 3 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
CASCON
1997
208views Education» more  CASCON 1997»
13 years 9 months ago
An architectural approach to building systems from COTS software components
As software systems become increasingly complex to build developers are turning more and more to integrating pre-built components from third party developers into their systems. T...
Mark R. Vigder, John C. Dean