Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
In this paper, we study the problem of testing Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANET). Testing is achieved by simulating different measurements. We mo...
Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bh...
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
We describe SANTA-G (Grid-enabled System Area Networks Trace Analysis), an instrument monitoring framework that uses the RGMA (Relational Grid Monitoring Architecture). We describe...
Abstract. This paper proposes a novel solution to spam detection inspired by a model of the adaptive immune system known as the crossregulation model. We report on the testing of a...