Sciweavers

1098 search results - page 205 / 220
» Proactive Intrusion Detection
Sort
View
CVIU
2011
14 years 4 months ago
A wearable gaze tracking system for children in unconstrained environments
We present here a head-mounted gaze tracking system for the study of visual behavior in unconstrained environments. The system is designed both for adults and for infants as young...
Basilio Noris, Jean-Baptiste Keller, Aude Billard
96
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
FCCM
2011
IEEE
311views VLSI» more  FCCM 2011»
14 years 1 months ago
String Matching in Hardware Using the FM-Index
—String matching is a ubiquitous problem that arises in a wide range of applications in computing, e.g., packet routing, intrusion detection, web querying, and genome analysis. D...
Edward Fernandez, Walid Najjar, Stefano Lonardi
GI
2005
Springer
15 years 3 months ago
Ein Ansatz zur Virtualisierung der Analyse von Audit-Daten
: Intrusion-Detection-Systeme (IDS) haben sich als wichtiges Instrument für den Schutz informationstechnischer Systeme erwiesen. Die meisten heute eingesetzten IDS realisieren ein...
Sebastian Schmerl
CONEXT
2007
ACM
15 years 1 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...