Sciweavers

294 search results - page 34 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
128
Voted
EUROSYS
2008
ACM
16 years 18 days ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
127
Voted
RTSS
1999
IEEE
15 years 7 months ago
HoneyWEB: Embedded Web-based Control Applications
High performance monitoring and control of real-time environments over the Internet is of importance to many users. The general public, as well as professionals, desires the abili...
Christiane Iaccarino, Meridith A. Sigel, Ralph E. ...
170
Voted
SEUS
2008
IEEE
15 years 10 months ago
Data Services in Distributed Real-Time Embedded Systems
The computing systems are becoming deeply embedded into ordinary life and interact with physical processes and events. They monitor the physical world with sensors and provide app...
Woochul Kang, Sang Hyuk Son
165
Voted
CCS
2010
ACM
15 years 3 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
118
Voted
SIGOPSE
1998
ACM
15 years 7 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau