Sciweavers

256 search results - page 43 / 52
» Design of a Snort-Based Hybrid Intrusion Detection System
Sort
View
ICAS
2008
IEEE
200views Robotics» more  ICAS 2008»
15 years 4 months ago
Connectivity of Thetis, a Distributed Hybrid Simulator, with a Mixed Control Architecture
—The purpose of this paper is to present the linkage of Thetis (a real time multi-vehicles hybrid simulator for heterogeneous vehicles) with a control architecture for the manage...
Olivier Parodi, Abdellah El Jalaoui, David Andreu
GLOBECOM
2009
IEEE
15 years 1 months ago
Adding Integrity Verification Capabilities to the LDPC-Staircase Erasure Correction Codes
File distribution is becoming a key technology, in particular in large scale content broadcasting systems like DVBH/SH. They largely rely on Application Level FEC codes (ALFEC) in ...
Mathieu Cunche, Vincent Roca
ACSAC
2009
IEEE
15 years 4 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar
CCS
2004
ACM
15 years 3 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
INFOCOM
2008
IEEE
15 years 4 months ago
Run-Time System for Scalable Network Services
Sophisticated middlebox services–such as network monitoring and intrusion detection, DDoS mitigation, worm scanning, XML parsing and protocol transformation–are becoming incre...
Upendra Shevade, Ravi Kokku, Harrick M. Vin