Sciweavers

294 search results - page 49 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
ISPASS
2009
IEEE
15 years 6 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
JIPS
2007
223views more  JIPS 2007»
14 years 11 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
CCS
2007
ACM
15 years 5 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
116
Voted
SIAMSC
2008
134views more  SIAMSC 2008»
14 years 11 months ago
Efficient Solution of Anisotropic Lattice Equations by the Recovery Method
In a recent paper, the authors introduced the recovery method resp. local energy matching principle for solving large systems of lattice equations. The idea is to construct a part...
Ivo Babuska, S. A. Sauter
107
Voted
HASE
2008
IEEE
15 years 6 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...