Sciweavers

655 search results - page 44 / 131
» A behavioral approach to worm detection
Sort
View
IPPS
2006
IEEE
15 years 3 months ago
Detecting phases in parallel applications on shared memory architectures
Most programs are repetitive, where similar behavior can be seen at different execution times. Algorithms have been proposed that automatically group similar portions of a program...
Erez Perelman, Marzia Polito, Jean-Yves Bouguet, J...
SEKE
2004
Springer
15 years 3 months ago
Automated Assistance for Eliciting User Expectations
People often use software for mundane tasks and expect it to be dependable enough for their needs. Unfortunately, the incomplete and imprecise specifications of such everyday sof...
Orna Raz, Rebecca B. Buchheit, Mary Shaw, Philip K...
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 3 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
ACSAC
2005
IEEE
15 years 3 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
DDECS
2009
IEEE
202views Hardware» more  DDECS 2009»
15 years 4 months ago
Asynchronous two-level logic of reduced cost
— We propose a novel synthesis method of a dual-rail asynchronous two-level logic of reduced cost. It is based on a model that operates under so called modified weak constraints....
Igor Lemberski, Petr Fiser