Sciweavers

733 search results - page 28 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
ACSAC
2009
IEEE
15 years 8 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar
OSDI
2002
ACM
16 years 2 months ago
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze atta...
George W. Dunlap, Samuel T. King, Sukru Cinar, Mur...
CORR
2004
Springer
111views Education» more  CORR 2004»
15 years 1 months ago
FLUX: A Logic Programming Method for Reasoning Agents
FLUX is a programming method for the design of agents that reason logically about their actions and sensor information in the presence of incomplete knowledge. The core of FLUX is...
Michael Thielscher
AIED
2005
Springer
15 years 7 months ago
The Use of Qualitative Reasoning Models of Interactions between Populations to Support Causal Reasoning of Deaf Students
Making inferences is crucial for understanding the world. The school may develop such skills but there are few formal opportunities for that. This paper describes an experiment de...
Paulo Salles, Heloisa Lima-Salles, Bert Bredeweg
98
Voted
NDSS
2005
IEEE
15 years 7 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...