Sciweavers

8177 search results - page 265 / 1636
» Detecting System Emulators
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 9 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
DATE
2004
IEEE
158views Hardware» more  DATE 2004»
15 years 7 months ago
Communication Analysis for System-On-Chip Design
In this paper we present an approach for analysis of systems of parallel, communicating processes for SoC design. We present a method to detect communications that synchronize the...
Axel Siebenborn, Oliver Bringmann, Wolfgang Rosens...
ICSE
2009
IEEE-ACM
15 years 28 days ago
Improving conflict resolution in model versioning systems
Collaborative software development is nowadays inconceivable without optimistic version control systems (VCSs). Without such systems the parallel modification of one artifact by m...
Petra Broschy
ICIP
2007
IEEE
16 years 4 months ago
Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia
In this paper, we analyze the effect of various collusion attacks on fingerprinting systems for compressed multimedia. We evaluate the effectiveness of the collusion attacks in te...
Avinash L. Varna, Shan He, Ashwin Swaminathan, Min...
NSDI
2010
15 years 4 months ago
Carousel: Scalable Logging for Intrusion Prevention Systems
We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and...
Vinh The Lam, Michael Mitzenmacher, George Varghes...