Sciweavers

2281 search results - page 185 / 457
» Security Patterns and Secure Systems Design
Sort
View
124
Voted
KBSE
2005
IEEE
15 years 6 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
IEEEARES
2008
IEEE
15 years 7 months ago
Design of an FDB based Intra-domain Packet Traceback System
In this paper, we propose an FDB based intra-Domain Traceback System (FDB-DTS), which is a hybrid traceback system composed of packet digesting boxes and an iterative query engine...
Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadob...
94
Voted
ECIS
2000
15 years 2 months ago
Using EMV Smartcards for Internet Payments
Abstract--Existing smartcards developed for point-ofsale payments are being considered for use in Internet transactions. Such use provides an alternative to designing new smartcard...
Els van Herreweghen, Uta Wille
CCS
2009
ACM
15 years 7 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
87
Voted
ICANN
2005
Springer
15 years 6 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...