Sciweavers

137 search results - page 23 / 28
» A Host Intrusion Prevention System for Windows Operating Sys...
Sort
View
94
Voted
LISA
2003
14 years 11 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
TES
2001
Springer
15 years 1 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
15 years 2 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
USS
2004
14 years 11 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
USS
2010
14 years 7 months ago
Searching the Searchers with SearchAudit
Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully craft...
John P. John, Fang Yu, Yinglian Xie, Martín...