Sciweavers

1587 search results - page 181 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
84
Voted
SP
2007
IEEE
15 years 4 months ago
Using Rescue Points to Navigate Software Recovery
We present a new technique that enables software recovery in legacy applications by retrofitting exception-handling capabilities, error virtualization using rescue points. We int...
Stelios Sidiroglou, Oren Laadan, Angelos D. Keromy...
RAID
2001
Springer
15 years 2 months ago
Aggregation and Correlation of Intrusion-Detection Alerts
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Hervé Debar, Andreas Wespi
80
Voted
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 1 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
98
Voted
STORAGESS
2006
ACM
15 years 4 months ago
Using device diversity to protect data against batch-correlated disk failures
Batch-correlated failures result from the manifestation of a common defect in most, if not all, disk drives belonging to the same production batch. They are much less frequent tha...
Jehan-François Pâris, Darrell D. E. L...
VIZSEC
2005
Springer
15 years 3 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...