Sciweavers

682 search results - page 120 / 137
» KIDS - Keyed Intrusion Detection System
Sort
View
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
14 years 1 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
IISWC
2008
IEEE
14 years 4 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
ATC
2009
Springer
14 years 1 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
ISSA
2004
13 years 11 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
13 years 4 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...