Sciweavers

429 search results - page 24 / 86
» Multivariate statistical analysis for network attacks detect...
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
IH
2004
Springer
14 years 1 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
BMCBI
2010
96views more  BMCBI 2010»
13 years 8 months ago
A statistical framework for differential network analysis from microarray data
Background: It has been long well known that genes do not act alone; rather groups of genes act in consort during a biological process. Consequently, the expression levels of gene...
Ryan Gill, Somnath Datta, Susmita Datta
ACSAC
2006
IEEE
14 years 2 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 8 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin