Sciweavers

9503 search results - page 13 / 1901
» Authenticated System Calls
Sort
View
IEEEIAS
2009
IEEE
15 years 6 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
DAGSTUHL
2007
15 years 1 months ago
Sensor Technologies for AL Systems Integrated Health Monitoring and Emergency Call System
Most developed countries are facing an ageing population, leading to an increasing demand on both health care and social welfare systems. There is a general agreement that these in...
Roc Berenguer
CCS
2000
ACM
15 years 4 months ago
Operating system enhancements to prevent the misuse of system calls
Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Ma...
WMASH
2003
ACM
15 years 5 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
CCS
2007
ACM
15 years 5 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...