Sciweavers

294 search results - page 13 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
CCS
2010
ACM
14 years 12 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
EAAI
2006
75views more  EAAI 2006»
14 years 11 months ago
Multi-agent framework based on smart sensors/actuators for machine tools control and monitoring
Throughout the history, the evolutions of the requirements for manufacturing equipments have depended on the changes in the customers' demands. Among the present trends in th...
Xavier Desforges, Bernard Archimède
73
Voted
CCS
2004
ACM
15 years 5 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
98
Voted
COORDINATION
2006
Springer
15 years 3 months ago
Synthesizing Concurrency Control Components from Process Algebraic Specifications
Process algebraic specifications can provide useful support for the architectural design of software systems due to the possibility of analyzing their properties. In addition to th...
Edoardo Bontà, Marco Bernardo, Jeff Magee, ...
85
Voted
HT
2005
ACM
15 years 5 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver