Sciweavers

294 search results - page 11 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
117
Voted
CCE
2007
15 years 2 months ago
Performance monitoring of industrial controllers based on the predictability of controller behavior
This study focuses on performance assessment of industrial controllers. A methodology based on the concept of the predictability of controller errors is proposed for performance m...
Rachid A. Ghraizi, Ernesto Martínez, C&eacu...
124
Voted
DFT
1998
IEEE
94views VLSI» more  DFT 1998»
15 years 7 months ago
An Integrated HW and SW Fault Injection Environment for Real-Time Systems
This paper describes a system suited to support the Fault Injection process for microprocessor-based embedded systems. The system exploits a low-cost hardware board to monitor the...
Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza R...
190
Voted
DIMVA
2011
14 years 6 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
97
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
121
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson