Sciweavers

1244 search results - page 114 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
RAID
2010
Springer
15 years 2 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ANCS
2008
ACM
15 years 6 months ago
A remotely accessible network processor-based router for network experimentation
Over the last decade, programmable Network Processors (NPs) have become widely used in Internet routers and other network components. NPs enable rapid development of complex packe...
Charlie Wiseman, Jonathan S. Turner, Michela Becch...
ACSAC
2005
IEEE
15 years 10 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
187
Voted
ICWN
2009
15 years 2 months ago
Wireless Sensor Network for Landslide Detection
Abstract-- The power of wireless sensor network techonology has provided the capability of developing large scale systems for real-time monitoring.This paper describes the evolutio...
Maneesha V. Ramesh, Sangeeth Kumar, P. Venkat Rang...
ANCS
2007
ACM
15 years 8 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...