Sciweavers

294 search results - page 49 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
126
Voted
ISPASS
2009
IEEE
15 years 10 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
161
Voted
JIPS
2007
223views more  JIPS 2007»
15 years 3 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
126
Voted
CCS
2007
ACM
15 years 9 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
145
Voted
SIAMSC
2008
134views more  SIAMSC 2008»
15 years 3 months ago
Efficient Solution of Anisotropic Lattice Equations by the Recovery Method
In a recent paper, the authors introduced the recovery method resp. local energy matching principle for solving large systems of lattice equations. The idea is to construct a part...
Ivo Babuska, S. A. Sauter
HASE
2008
IEEE
15 years 10 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...