Sciweavers

1013 search results - page 164 / 203
» Intrusion detection
Sort
View
117
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
ANCS
2009
ACM
14 years 8 months ago
SPC-FA: synergic parallel compact finite automaton to accelerate multi-string matching with low memory
Deterministic Finite Automaton (DFA) is well-known for its constant matching speed in worst case, and widely used in multistring matching, which is a critical technique in high pe...
Junchen Jiang, Yi Tang, Bin Liu, Xiaofei Wang, Yan...
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
15 years 4 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
HUC
2009
Springer
15 years 2 months ago
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to recognize human activities. In our setting, everyday objects are instrumented with UHF RFID tags ca...
Michael Buettner, Richa Prasad, Matthai Philipose,...
82
Voted
IPM
2011
118views more  IPM 2011»
14 years 5 months ago
Detecting spam blogs from blog search results
Blogging has been an emerging media for people to express themselves. However, the presence of spam-blogs (also known as splogs) may reduce the value of blogs and blog search engi...
Linhong Zhu, Aixin Sun, Byron Choi