Sciweavers

24 search results - page 5 / 5
» Real time intrusion prediction, detection and prevention pro...
Sort
View
CF
2004
ACM
13 years 10 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
IPPS
2007
IEEE
13 years 11 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
BMCBI
2010
119views more  BMCBI 2010»
13 years 5 months ago
A comparison of internal validation techniques for multifactor dimensionality reduction
Background: It is hypothesized that common, complex diseases may be due to complex interactions between genetic and environmental factors, which are difficult to detect in high-di...
Stacey J. Winham, Andrew J. Slater, Alison A. Mots...
AIME
2007
Springer
13 years 11 months ago
An Intelligent Aide for Interpreting a Patient's Dialysis Data Set
Many machines used in the modern hospital settings offer real time physiological monitoring. Haemodialysis machines combine a therapeutic treatment system integrated with sophistic...
Derek H. Sleeman, Nick Fluck, Elias Gyftodimos, La...