Sciweavers

1804 search results - page 170 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
JPDC
2006
253views more  JPDC 2006»
15 years 4 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
RAS
2000
130views more  RAS 2000»
15 years 4 months ago
Allocating optimal index positions on tool magazines using genetic algorithms
This paper presents an optimisation system software developed for the determination of optimal index positions of cutting tools on the automatic tool changer (ATC) or turret magaz...
Türkay Dereli, I. Hüseyin Filiz
VLSISP
2008
140views more  VLSISP 2008»
15 years 4 months ago
Regular Expression Matching in Reconfigurable Hardware
In this paper we describe a regular expression pattern matching approach for reconfigurable hardware. Following a Non-deterministic Finite Automata direction, we introduce three ne...
Ioannis Sourdis, João Bispo, João M....
INFOCOM
2010
IEEE
15 years 2 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
PLDI
2010
ACM
15 years 8 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev