Sciweavers

336 search results - page 53 / 68
» Immune System Approaches to Intrusion Detection - A Review
Sort
View
SISW
2003
IEEE
15 years 5 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
WSC
2007
15 years 2 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
ACSAC
2009
IEEE
15 years 6 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar
ICB
2007
Springer
106views Biometrics» more  ICB 2007»
15 years 6 months ago
Vitality Detection from Fingerprint Images: A Critical Survey
Although fingerprint verification systems reached a high degree of accuracy, it has been recently shown that they can be circumvented by “fake fingers”, namely, fingerprint ima...
Pietro Coli, Gian Luca Marcialis, Fabio Roli
ICNP
1999
IEEE
15 years 4 months ago
Fault Detection in Routing Protocols
Routing protocol faults cause problems ranging from an inability to communicate to excessive routing overhead. This paper proposes a system for detecting a wide range of routing p...
Daniel Massey, Bill Fenner