Sciweavers

1013 search results - page 138 / 203
» Intrusion detection
Sort
View
189
Voted
USS
2010
15 years 3 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
142
Voted
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
15 years 9 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
COCOA
2008
Springer
15 years 7 months ago
Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region
Intrusion detection, area coverage and border surveillance are important applications of wireless sensor networks today. They can be (and are being) used to monitor large unprotec...
Binay K. Bhattacharya, B. Burmester, Yuzhuang Hu, ...
IEEEARES
2008
IEEE
15 years 11 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
174
Voted
IEEECIT
2006
IEEE
15 years 11 months ago
An Energy-Efficient Localization Scheme with Specified Lower Bound for Wireless Sensor Networks
Localization is a basic and critical requirement for wireless sensor network applications, e.g. target tracking, monitoring and intrusion detection. In the received signal strengt...
Haoran Feng, Ruixi Yuan, Chundi Mu