Sciweavers

877 search results - page 146 / 176
» Intrusion detection systems as evidence
Sort
View
GI
2003
Springer
15 years 7 months ago
Ohne Sicherheit kein Vertrauen in E-Business und eingebettete Systeme
Das Fachgebiet Sicherheit hat sich in den vergangenen Jahren aus verschiedenen Disziplinen der Informatik als Querschnittsthema der Angewandten, Praktischen, Theoretischen und Tech...
Isabel Münch, Manfred Reitenspieß
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 7 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
CN
2007
91views more  CN 2007»
15 years 1 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
ASPLOS
2011
ACM
14 years 5 months ago
Hardware acceleration of transactional memory on commodity systems
The adoption of transactional memory is hindered by the high overhead of software transactional memory and the intrusive design changes required by previously proposed TM hardware...
Jared Casper, Tayo Oguntebi, Sungpack Hong, Nathan...
MOBISYS
2006
ACM
16 years 1 months ago
ARIADNE: a dynamic indoor signal map construction and localization system
Location determination of mobile users within a building has attracted much attention lately due to its many applications in mobile networking including network intrusion detectio...
Yiming Ji, Saad Biaz, Santosh Pandey, Prathima Agr...