Sciweavers

878 search results - page 90 / 176
» A Compiler-Based Approach to Data Security
Sort
View
117
Voted
ACSAC
2003
IEEE
15 years 8 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
147
Voted
CNSR
2004
IEEE
174views Communications» more  CNSR 2004»
15 years 7 months ago
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
This paper presents a novel approach for detecting network intrusions based on a competitive learning neural network. In the paper, the performance of this approach is compared to...
John Zhong Lei, Ali A. Ghorbani
131
Voted
DAC
2005
ACM
16 years 4 months ago
High performance encryption cores for 3G networks
This paper presents two novel and high performance hardware architectures, implemented in FPGA technology, for the KASUMI block cipher; this algorithm lies at the core of the conf...
René Cumplido, Tomás Balderas-Contre...
125
Voted
PET
2005
Springer
15 years 9 months ago
Privacy Issues in Vehicular Ad Hoc Networks
Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private ...
Florian Dötzer
145
Voted
SP
2002
IEEE
170views Security Privacy» more  SP 2002»
15 years 3 months ago
Alert Correlation in a Cooperative Intrusion Detection Framework
This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection systems (IDS). This module implements functions t...
Frédéric Cuppens, Alexandre Mi&egrav...