Sciweavers

256 search results - page 42 / 52
» Design of a Snort-Based Hybrid Intrusion Detection System
Sort
View
AINA
2006
IEEE
15 years 3 months ago
HyMoNet: a peer-to-peer hybrid multicast overlay network for efficient live media streaming
This paper presents HyMoNet, a peer-to-peer hybrid multicast overlay network for efficient live media streaming. The system comprises two parts: service infrastructure and user sp...
Bin Chang, Yuanchun Shi, Nan Zhang
SIGCOMM
2010
ACM
14 years 10 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
FAST
2004
14 years 11 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
JUCS
2008
112views more  JUCS 2008»
14 years 9 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
ASPLOS
2011
ACM
14 years 1 months ago
Hardware acceleration of transactional memory on commodity systems
The adoption of transactional memory is hindered by the high overhead of software transactional memory and the intrusive design changes required by previously proposed TM hardware...
Jared Casper, Tayo Oguntebi, Sungpack Hong, Nathan...