Sciweavers

294 search results - page 11 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
89
Voted
CCE
2007
14 years 11 months ago
Performance monitoring of industrial controllers based on the predictability of controller behavior
This study focuses on performance assessment of industrial controllers. A methodology based on the concept of the predictability of controller errors is proposed for performance m...
Rachid A. Ghraizi, Ernesto Martínez, C&eacu...
92
Voted
DFT
1998
IEEE
94views VLSI» more  DFT 1998»
15 years 3 months ago
An Integrated HW and SW Fault Injection Environment for Real-Time Systems
This paper describes a system suited to support the Fault Injection process for microprocessor-based embedded systems. The system exploits a low-cost hardware board to monitor the...
Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza R...
151
Voted
DIMVA
2011
14 years 3 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
ACSAC
2002
IEEE
15 years 4 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
ACSAC
2005
IEEE
15 years 5 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson