Sciweavers

6 search results - page 2 / 2
» Application Monitoring in the Grid with GRM and PROVE
Sort
View
CASES
2005
ACM
13 years 7 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...