Sciweavers

496 search results - page 100 / 100
» Dual-polarized wireless communications: from propagation mod...
Sort
View
CCS
2003
ACM
13 years 10 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson