IWIA   2006 International Workshop on Innovative Architecture for Future Generation High-Performance Processors and Systems
Wall of Fame | Most Viewed IWIA-2006 Paper
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source151
2Download preprint from source135
3Download preprint from source134
4Download preprint from source121
5Download preprint from source118
6Download preprint from source110