Sciweavers

1804 search results - page 112 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
IJIPT
2010
147views more  IJIPT 2010»
14 years 8 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
HPDC
2010
IEEE
14 years 11 months ago
MPIPairwiseStatSig: parallel pairwise statistical significance estimation of local sequence alignment
Sequence comparison is considered as a cornerstone application in bioinformatics, which forms the basis of many other applications. In particular, pairwise sequence alignment is a...
Ankit Agrawal, Sanchit Misra, Daniel Honbo, Alok N...
DIMVA
2009
14 years 11 months ago
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...
ICNC
2005
Springer
15 years 3 months ago
An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending
In this paper, we review a visual approach and propose it for analysing computer-network activity, which is based on the use of unsupervised connectionist neural network models and...
Álvaro Herrero, Emilio Corchado, José...
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 1 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...