Sciweavers

2503 search results - page 200 / 501
» Building Computer Network Attacks
Sort
View
ICECCS
2000
IEEE
105views Hardware» more  ICECCS 2000»
15 years 6 months ago
Distributed Development of Complex Software Systems with Object Make
Production of a large-scale software system involves quite a few software components. It is very common to develop such software components in a distributed environment consisting...
Yasuhiro Sugiyama
RAID
2007
Springer
15 years 8 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
SOUPS
2006
ACM
15 years 7 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 7 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
RAID
2004
Springer
15 years 7 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...