113
click to vote
RAID
15 years 6 months ago
2005 Springer
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
108
click to vote
RAID
15 years 6 months ago
2005 Springer
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
92
Voted
RAID
15 years 6 months ago
2005 Springer
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
79
Voted
RAID
15 years 6 months ago
2005 Springer 87
Voted
RAID
15 years 6 months ago
2005 Springer
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running different programs and executing on different platforms—behave si...
|