Sciweavers

190 search results - page 18 / 38
» From Monitoring Templates to Security Monitoring and Threat ...
Sort
View
CORR
2011
Springer
197views Education» more  CORR 2011»
12 years 11 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
DSN
2004
IEEE
13 years 11 months ago
An Architectural Framework for Providing Reliability and Security Support
This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level framework called the Reliability and Security Engine (RSE)...
Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. ...
SECPERU
2006
IEEE
14 years 1 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
WACV
2005
IEEE
14 years 3 months ago
Detecting Motion Patterns via Direction Maps with Application to Surveillance
To facilitate accurate and efficient detection of motion patterns in video data, it is desirable to abstract from pixel intensity values to representations that explicitly and co...
Jacob M. Gryn, Richard P. Wildes, John K. Tsotsos
INFOCOM
2007
IEEE
14 years 2 months ago
Detection and Localization of Network Black Holes
— Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fa...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...