Sciweavers

708 search results - page 56 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
COLING
2002
13 years 8 months ago
Using Collocations for Topic Segmentation and Link Detection
We present in this paper a method for achieving in an integrated way two tasks of topic analysis: segmentation and link detection. This method combines word repetition and the lex...
Olivier Ferret
WISTP
2007
Springer
14 years 2 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
DISCEX
2003
IEEE
14 years 2 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
ICASSP
2011
IEEE
13 years 17 days ago
Towards improving network flow watermarks using the repeat-accumulate codes
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
Amir Houmansadr, Nikita Borisov
AINA
2008
IEEE
14 years 3 months ago
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...
Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su