Sciweavers

2236 search results - page 87 / 448
» Intrusion detection techniques and approaches
Sort
View
SEMWEB
2009
Springer
15 years 4 months ago
A Pattern-based Ontology Matching Approach for Detecting Complex Correspondences
State of the art ontology matching techniques are limited to detect simple correspondences between atomic concepts and properties. Nevertheless, for many concepts and properties at...
Dominique Ritze, Christian Meilicke, Ondrej Sv&aac...
CSREASAM
2008
14 years 11 months ago
A Multi-Layered Approach to Botnet Detection
Robert F. Erbacher, Adele Cutler, Pranab Banerjee,...
CN
2008
84views more  CN 2008»
14 years 10 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
CSFW
2007
IEEE
15 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
HASE
2008
IEEE
14 years 10 months ago
Randomization Based Probabilistic Approach to Detect Trojan Circuits
In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be...
Susmit Jha, Sumit Kumar Jha