Sciweavers

319 search results - page 43 / 64
» A Compound Intrusion Detection Model
Sort
View
123
Voted
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
15 years 10 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
165
Voted
CCS
2010
ACM
15 years 3 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
147
Voted
WWW
2009
ACM
15 years 10 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
144
Voted
BMCBI
2005
116views more  BMCBI 2005»
15 years 3 months ago
SuperLigands - a database of ligand structures derived from the Protein Data Bank
Background: Currently, the PDB contains approximately 29,000 protein structures comprising over 70,000 experimentally determined three-dimensional structures of over 5,000 differe...
Elke Michalsky, Mathias Dunkel, Andrean Goede, Rob...
CAV
2000
Springer
97views Hardware» more  CAV 2000»
15 years 7 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...