Sciweavers

IAW
2003
IEEE
13 years 9 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
IAW
2003
IEEE
13 years 9 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
IAW
2003
IEEE
13 years 9 months ago
Risk Probability Estimating Based on Clustering
Yong Chen, Christian Damsgaard Jensen, Jean-Marc S...
IAW
2003
IEEE
13 years 9 months ago
Hidden Processes: The Implication for Intrusion Detection
James Butler, Jeffrey Undercoffer, John Pinkston