Sciweavers

252 search results - page 42 / 51
» Experimenting with Server-Aided Signatures
Sort
View
ICISC
2007
99views Cryptology» more  ICISC 2007»
13 years 9 months ago
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
VMM (virtual machine monitor) based system provides the useful inspection and interposition of guest OS. With proper modification of guest OS, we can obtain event-driven memory sn...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
NETWORKING
2007
13 years 9 months ago
Detecting 802.11 Wireless Hosts from Remote Passive Observations
Abstract. The wide deployment of 802.11 WLANs has led to the coexistence of wired and wireless clients in a network environment. This paper presents a robust technique to detect 80...
Valeria Baiamonte, Konstantina Papagiannaki, Gianl...
CIC
2004
13 years 9 months ago
On the Analysis of Packet-Train Probing Schemes
With a better understanding of how probe packets and cross-traffic packets interact with each other, more accurate measurement methods based on active probing can be developed. Sev...
Andreas Johnsson, Bob Melander, Mats Björkman
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 9 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
WORM
2004
13 years 8 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong