Sciweavers

198 search results - page 22 / 40
» Exploiting Independent State For Network Intrusion Detection
Sort
View
142
Voted
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
15 years 7 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
SIGMETRICS
2010
ACM
213views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
Small subset queries and bloom filters using ternary associative memories, with applications
Associative memories offer high levels of parallelism in matching a query against stored entries. We design and analyze an architecture which uses a single lookup into a Ternary C...
Ashish Goel, Pankaj Gupta
GLOBECOM
2007
IEEE
15 years 10 months ago
Wavelet Based Detection of Shadow Fading in Wireless Networks
— In wireless communications, shadow fading can cause at least 6 dB power loss for 10% of the time [1]. Early detection of shadow fading plays an important part in facilitating t...
Xiaobo Long, Biplab Sikdar
SECURWARE
2007
IEEE
15 years 9 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
140
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Sigma-Delta ADC Based Distributed Detection in Wireless Sensor Networks
Abstract—In the existing works on distributed detection in sensor networks, local sensor nodes either quantize the observation or directly scale the analog observation and then t...
Dimeng Wang, Shuangqing Wei, Guoxiang Gu