Sciweavers

877 search results - page 94 / 176
» Intrusion detection systems as evidence
Sort
View
ISI
2008
Springer
15 years 1 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
118
Voted
BMCBI
2006
178views more  BMCBI 2006»
15 years 2 months ago
MannDB - A microbial database of automated protein sequence analyses and evidence integration for protein characterization
Background: MannDB was created to meet a need for rapid, comprehensive automated protein sequence analyses to support selection of proteins suitable as targets for driving the dev...
Carol L. Ecale Zhou, Marisa Lam, Jason Smith, Adam...
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
15 years 7 months ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
DIMVA
2009
15 years 3 months ago
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
Jin Han, Debin Gao, Robert H. Deng
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 8 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie