Sciweavers

1804 search results - page 69 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ISMB
1994
14 years 11 months ago
An Improved System for Exon Recognition and Gene Modeling in Human DNA Sequence
A new version of the GRAIL system (Uberbacher and Mural, 1991; Mural et al., 1992; Uberbacher et al., 1993), called GRAILII, has recently been developed (Xu et al., 1994). GRAILII...
Yin Xu, J. Ralph Einstein, Richard J. Mural, Manes...
TNC
2004
120views Education» more  TNC 2004»
14 years 11 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
WCNC
2010
IEEE
15 years 1 months ago
Training Sequence-Aided Single-Carrier Block Signal Detection Using QRM-MLD
—Recently, we proposed a frequency-domain block signal detection using maximum likelihood detection (MLD) employing QR decomposition and M-algorithm (QRM-MLD) for the cyclic pref...
Tetsuya Yamamoto, Kazuki Takeda, Fumiyuki Adachi
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 1 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
POLICY
2007
Springer
15 years 4 months ago
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange
A VoIP PBX supports flexible call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. Both users and administrators need a flexi...
George Konstantoulakis, Morris Sloman