Sciweavers

71 search results - page 14 / 15
» A Worm Behavioral Approach to Susceptible Host Detection
Sort
View
CCS
2010
ACM
13 years 5 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
OSDI
2004
ACM
14 years 5 months ago
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services
Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. We observe that wide-area services, such as peerto-peer systems an...
Ming Zhang, Chi Zhang, Vivek S. Pai, Larry L. Pete...
MOBIHOC
2009
ACM
14 years 6 months ago
Optimal monitoring in multi-channel multi-radio wireless mesh networks
Wireless mesh networks (WMN) are finding increasing usage in city-wide deployments for providing network connectivity. Mesh routers in WMNs typically use multiple wireless channel...
Dong-Hoon Shin, Saurabh Bagchi
CASES
2009
ACM
13 years 9 months ago
A case study of on-chip sensor network in multiprocessor system-on-chip
Reducing feature sizes and power supply voltage allows integrating more processing units (PUs) on multiprocessor system-on-chip (MPSoC) to satisfy the increasing demands of applic...
Yu Wang 0002, Jiang Xu, Shengxi Huang, Weichen Liu...
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 5 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi