Sciweavers

1804 search results - page 126 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
97
Voted
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 4 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
62
Voted
CGO
2006
IEEE
15 years 4 months ago
Region Monitoring for Local Phase Detection in Dynamic Optimization Systems
Dynamic optimization relies on phase detection for two important functions (1) To detect change in code working set and (2) To detect change in performance characteristics that ca...
Abhinav Das, Jiwei Lu, Wei-Chung Hsu
106
Voted
ANCS
2009
ACM
14 years 8 months ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
89
Voted
WCNC
2010
IEEE
14 years 8 months ago
Combining Parallel Sequence Spread Spectrum (PSSS) with OFDM - Concept and Simulation Results
—In this paper, we present a novel multi-carrier spread spectrum (MCSS) system which uses Parallel Sequence Spread Spectrum (PSSS) as its spreading transform. This technique call...
Paulo Isagani M. Urriza, Joel Joseph S. Marciano J...
104
Voted
ISCI
2008
104views more  ISCI 2008»
14 years 9 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen