Sciweavers

386 search results - page 27 / 78
» Modeling Intrusion Detection Systems Using Linear Genetic Pr...
Sort
View
CCS
2007
ACM
14 years 19 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CAV
2009
Springer
209views Hardware» more  CAV 2009»
14 years 9 months ago
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers
Context-bounded analysis is an attractive approach to verification of concurrent programs. Bounding the number of contexts executed per thread not only reduces the asymptotic compl...
Shuvendu K. Lahiri, Shaz Qadeer, Zvonimir Rakamari...
DSN
2009
IEEE
13 years 6 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 3 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
HYBRID
2007
Springer
14 years 2 months ago
Robust, Optimal Predictive Control of Jump Markov Linear Systems Using Particles
Hybrid discrete-continuous models, such as Jump Markov Linear Systems, are convenient tools for representing many real-world systems; in the case of fault detection, discrete jumps...
Lars Blackmore, Askar Bektassov, Masahiro Ono, Bri...