Sciweavers

97 search results - page 13 / 20
» Rapid Prototyping of Intrusion Detection Systems
Sort
View
CP
2007
Springer
15 years 3 months ago
Solving the Salinity Control Problem in a Potable Water System
Salinity is the relative concentration of salts in water. In a city of southern China, the local water supply company pumps water from a nearby river for potable use. During the wi...
Chiu Wo Choi, Jimmy Ho-Man Lee
ANSS
2006
IEEE
15 years 3 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 3 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
92
Voted
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 3 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 3 months ago
A Novel Algorithm and Architecture for High Speed Pattern Matching in Resource-Limited Silicon Solution
— Network Intrusion Detection Systems (NIDS) are more and more important for identifying and preventing the malicious attacks over the network. This paper proposes a novel cost-e...
Nen-Fu Huang, Yen-Ming Chu, Chi-Hung Tsai, Chen-Yi...