Sciweavers

97 search results - page 14 / 20
» Rapid Prototyping of Intrusion Detection Systems
Sort
View
82
Voted
ACSAC
2005
IEEE
15 years 3 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
78
Voted
ICAT
2003
IEEE
15 years 2 months ago
The study of remote saccade sensing system based on retroreflective feature of the retina
We present a new method for detecting rapid eye movements called a saccade without constraining the head, based on the fast, robust pupil detection technique [1][2]. The technique...
Junji Watanabe, Hideyuki Ando, Dairoku Sekiguchi, ...
92
Voted
CLUSTER
2006
IEEE
14 years 9 months ago
Autonomous recovery in componentized Internet applications
In this paper we show how to reduce downtime of J2EE applications by rapidly and automatically recovering from transient and intermittent software failures, without requiring appl...
George Candea, Emre Kiciman, Shinichi Kawamoto, Ar...
WSC
1998
14 years 11 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...
ICCD
2008
IEEE
136views Hardware» more  ICCD 2008»
15 years 6 months ago
A resource efficient content inspection system for next generation Smart NICs
— The aggregate power consumption of the Internet is increasing at an alarming rate, due in part to the rapid increase in the number of connected edge devices such as desktop PCs...
Karthik Sabhanatarajan, Ann Gordon-Ross