Sciweavers

1737 search results - page 259 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
131
Voted
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
15 years 1 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
138
Voted
CTRSA
2003
Springer
96views Cryptology» more  CTRSA 2003»
15 years 7 months ago
Hardware Performance Characterization of Block Cipher Structures
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) ma...
Lu Xiao, Howard M. Heys
125
Voted
CNIS
2006
15 years 4 months ago
Towards effective packet classification
A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
Yaxuan Qi, Jun Li
108
Voted
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 9 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
FC
2005
Springer
142views Cryptology» more  FC 2005»
15 years 8 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova