Sciweavers

256 search results - page 37 / 52
» Design of a Snort-Based Hybrid Intrusion Detection System
Sort
View
NSDI
2004
14 years 11 months ago
Constructing Services with Interposable Virtual Hardware
Virtual machine monitors (VMMs) have enjoyed a resurgence in popularity, since VMMs can help to solve difficult systems problems like migration, fault tolerance, code sandboxing, ...
Andrew Whitaker, Richard S. Cox, Marianne Shaw, St...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 1 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
15 years 3 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
RTSS
2009
IEEE
15 years 4 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
IMC
2004
ACM
15 years 3 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese