Sciweavers

27 search results - page 4 / 6
» Regular Protocols and Attacks with Regular Knowledge
Sort
View
OPODIS
2003
13 years 7 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 24 days ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
FPL
2003
Springer
100views Hardware» more  FPL 2003»
13 years 11 months ago
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall use...
John W. Lockwood, Christopher E. Neely, Christophe...
SIGCOMM
2010
ACM
13 years 6 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
BALT
2006
13 years 9 months ago
Pattern Repositories for Software Engineering Education
Abstract. Modern software engineering attacks its complexity problems by applying well-understood development principles. In particular, the systematic adoption of design patterns ...
Hans-Werner Sehring, Sebastian Bossung, Patrick Hu...