Sciweavers

682 search results - page 97 / 137
» KIDS - Keyed Intrusion Detection System
Sort
View
IPSN
2010
Springer
14 years 4 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...
RTSS
2009
IEEE
14 years 4 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
RAID
2001
Springer
14 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
CCS
2006
ACM
14 years 1 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
ACSAC
2004
IEEE
14 years 1 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna