Sciweavers

294 search results - page 11 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
CCE
2007
13 years 8 months ago
Performance monitoring of industrial controllers based on the predictability of controller behavior
This study focuses on performance assessment of industrial controllers. A methodology based on the concept of the predictability of controller errors is proposed for performance m...
Rachid A. Ghraizi, Ernesto Martínez, C&eacu...
DFT
1998
IEEE
94views VLSI» more  DFT 1998»
14 years 26 days ago
An Integrated HW and SW Fault Injection Environment for Real-Time Systems
This paper describes a system suited to support the Fault Injection process for microprocessor-based embedded systems. The system exploits a low-cost hardware board to monitor the...
Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza R...
DIMVA
2011
13 years 3 days ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
ACSAC
2002
IEEE
14 years 1 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
ACSAC
2005
IEEE
14 years 2 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson