Sciweavers

2503 search results - page 19 / 501
» Building Computer Network Attacks
Sort
View
CCS
2003
ACM
15 years 2 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
86
Voted
MMMACNS
2005
Springer
15 years 3 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
AIM
2002
14 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
ICANN
2005
Springer
15 years 3 months ago
Building the Cerebellum in a Computer
Abstract. We have built a realistic computational model of the cerebellum. This model simulates the cerebellar cortex of the size 0.5mm×1mm consisting of several types of neurons,...
Tadashi Yamazaki, Shigeru Tanaka