Sciweavers

3785 search results - page 165 / 757
» Immune System Based Intrusion Detection System
Sort
View
AOSD
2010
ACM
15 years 10 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
142
Voted
ISCAPDCS
2004
15 years 6 months ago
A Reputation-based Trust Management in Peer-to-Peer Network Systems
Peer-to-peer networks have gained a lot of attention over the last couple of years, mainly due to the popularity of the free multimedia file-sharing program Napster and a legal ba...
Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong...
169
Voted
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 11 months ago
A Novel Algorithm and Architecture for High Speed Pattern Matching in Resource-Limited Silicon Solution
— Network Intrusion Detection Systems (NIDS) are more and more important for identifying and preventing the malicious attacks over the network. This paper proposes a novel cost-e...
Nen-Fu Huang, Yen-Ming Chu, Chi-Hung Tsai, Chen-Yi...
142
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 5 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
COLING
2008
15 years 6 months ago
Coreference Systems Based on Kernels Methods
Various types of structural information e.g., about the type of constructions in which binding constraints apply, or about the structure of names - play a central role in corefere...
Yannick Versley, Alessandro Moschitti, Massimo Poe...