The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
Over the last decade, programmable Network Processors (NPs) have become widely used in Internet routers and other network components. NPs enable rapid development of complex packe...
Charlie Wiseman, Jonathan S. Turner, Michela Becch...
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
Abstract-- The power of wireless sensor network techonology has provided the capability of developing large scale systems for real-time monitoring.This paper describes the evolutio...
Maneesha V. Ramesh, Sangeeth Kumar, P. Venkat Rang...
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...