Sciweavers

173 search results - page 14 / 35
» Dynamic information source selection for intrusion detection...
Sort
View
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 3 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
14 years 10 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
109
Voted
WSE
2006
IEEE
15 years 3 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
CCS
2007
ACM
15 years 3 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
GLOBECOM
2008
IEEE
14 years 9 months ago
Novel Rateless Coded Selection Cooperation in Dual-Hop Relaying Systems
Selection cooperation is proposed for rateless coded relaying by developing a novel low-complexity protocol that exploits all source-destination, source-relay, and relay-destinatio...
Reza Nikjah, Norman C. Beaulieu