Sciweavers

1804 search results - page 121 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
91
Voted
ETRICS
2006
15 years 1 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 10 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
CIS
2009
Springer
15 years 2 months ago
A Virus Detection System Based on Artificial Immune System
A virus detection system (VDS) based on artificial immune system (AIS) is proposed in this paper. VDS at first generates the detector set from virus files in the dataset, negative ...
Rui Chao, Ying Tan
81
Voted
CGO
2007
IEEE
15 years 4 months ago
Evaluating Indirect Branch Handling Mechanisms in Software Dynamic Translation Systems
Software Dynamic Translation (SDT) systems are used for program instrumentation, dynamic optimization, security, intrusion detection, and many other uses. As noted by many researc...
Jason Hiser, Daniel Williams, Wei Hu, Jack W. Davi...
83
Voted
ICCCN
2007
IEEE
15 years 4 months ago
Bloom Filter Accelerator for String Matching
— In this paper we present a hardware architecture for string matching. Our solution based on using a Bloom filter based pre-processor and a parallelized hashing engine is capab...
M. Nourani, P. Katta