Sciweavers

868 search results - page 95 / 174
» On Analog Signature Analysis
Sort
View
CHES
2006
Springer
146views Cryptology» more  CHES 2006»
15 years 1 months ago
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin
RAID
2000
Springer
15 years 1 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
ER
2008
Springer
179views Database» more  ER 2008»
14 years 11 months ago
Recommendation Based Process Modeling Support: Method and User Experience
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Thomas Hornung, Agnes Koschmider, Georg Lausen
DMIN
2006
141views Data Mining» more  DMIN 2006»
14 years 11 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
CSREASAM
2003
14 years 11 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen