Sciweavers

5234 search results - page 186 / 1047
» Simulation of Computer Network Attacks
Sort
View
109
Voted
WWW
2008
ACM
16 years 3 months ago
Protecting web services from remote exploit code: a static analysis approach
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 6 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
143
Voted
ADHOCNOW
2006
Springer
15 years 8 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou
126
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 2 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
129
Voted
IJON
2007
83views more  IJON 2007»
15 years 2 months ago
Neurospaces: Towards automated model partitioning for parallel computers
Parallel computers have the computing power needed to simulate biologically accurate neuronal network models. Partitioning is the process of cutting a model in pieces and assignin...
Hugo Cornelis, Erik De Schutter