Sciweavers

256 search results - page 33 / 52
» Design of a Snort-Based Hybrid Intrusion Detection System
Sort
View
VTC
2010
IEEE
129views Communications» more  VTC 2010»
14 years 8 months ago
A Near-Capacity Differentially Encoded Non-Coherent Adaptive Multiple-Symbol-Detection Aided Three-Stage Coded Scheme
Abstract—This paper presents an Irregular Distributed Hybrid Concatenated Differential (Ir-DHCD) coding scheme contrived for the relayaided differential decode-and-forward (DDF) ...
Li Wang, Lingkun Kong, Soon Xin Ng, Lajos Hanzo
ICCCN
2007
IEEE
15 years 4 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ISCI
2008
104views more  ISCI 2008»
14 years 9 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
IJIPT
2010
147views more  IJIPT 2010»
14 years 8 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
SIGCOMM
2006
ACM
15 years 3 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...