Sciweavers

877 search results - page 140 / 176
» Intrusion detection systems as evidence
Sort
View
ICCCN
2007
IEEE
15 years 8 months ago
Lagniappe: Multi-* Programming Made Simple
—The emergence of multi-processor, multi-threaded architectures (referred to as multi- architectures) facilitates the design of high-throughput request processing systems (e.g., ...
Taylor L. Riché, R. Greg Lavender, Harrick ...
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
15 years 7 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
DAC
2007
ACM
16 years 2 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
DSN
2007
IEEE
15 years 8 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
ISVC
2007
Springer
15 years 8 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano