Sciweavers

12637 search results - page 153 / 2528
» Security for Extensible Systems
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
14 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
CSFW
2011
IEEE
12 years 9 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
IACR
2011
137views more  IACR 2011»
12 years 8 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
ACSAC
2006
IEEE
14 years 28 days ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
PE
2008
Springer
139views Optimization» more  PE 2008»
13 years 9 months ago
Performance optimization of region-based group key management in mobile ad hoc networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Jin-Hee Cho, Ing-Ray Chen, Ding-Chau Wang