Sciweavers

33 search results - page 6 / 7
» Exploiting Pattern Relationship for Intrusion Detection
Sort
View
ETRICS
2006
13 years 9 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
GI
2009
Springer
13 years 3 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
ICSE
2000
IEEE-ACM
13 years 9 months ago
Quickly detecting relevant program invariants
Explicitly stated program invariants can help programmers by characterizing certain aspects of program execution and identifying program properties that must be preserved when mod...
Michael D. Ernst, Adam Czeisler, William G. Griswo...
ANCS
2006
ACM
13 years 9 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
PRESENCE
2007
119views more  PRESENCE 2007»
13 years 5 months ago
Gaze-Contingent Visual Presentation Based on Remote Saccade Detection
Pursuing new display techniques based on insights into human visual perception can reveal new possibilities for visual information devices. Here, we propose a novel information pr...
Junji Watanabe, Hideyuki Ando, Taro Maeda, Susumu ...