Sciweavers

12183 search results - page 140 / 2437
» Computers under Attacks!
Sort
View
118
Voted
WSC
2007
15 years 7 months ago
Modeling bioterrorism preparedness with simulation in rural healthcare system
As a result of the anthrax letter incidents in 2001, concerns about terrorists’ use of biological agents have increased dramatically at government state and federal levels. The ...
Lisa Patvivatsiri, Elliot J. Montes Jr., Ouyang Xi
JSW
2008
164views more  JSW 2008»
15 years 4 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
157
Voted
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 10 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 10 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
AAAI
2006
15 years 6 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...