Sciweavers

24 search results - page 5 / 5
» Intrusion Detection Testing and Benchmarking Methodologies
Sort
View
VIZSEC
2004
Springer
13 years 11 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
CODES
2007
IEEE
14 years 3 days ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
POPL
2004
ACM
14 years 6 months ago
Atomizer: a dynamic atomicity checker for multithreaded programs
Ensuring the correctness of multithreaded programs is difficult, due to the potential for unexpected interactions between concurrent threads. Much previous work has focused on det...
Cormac Flanagan, Stephen N. Freund
BMCBI
2007
151views more  BMCBI 2007»
13 years 5 months ago
Identification of hot regions in protein-protein interactions by sequential pattern mining
Background: Identification of protein interacting sites is an important task in computational molecular biology. As more and more protein sequences are deposited without available...
Chen-Ming Hsu, Chien-Yu Chen, Baw-Jhiune Liu, Chih...