Sciweavers

154 search results - page 23 / 31
» Security architecture testing using IDS - a case study
Sort
View
CEC
2009
IEEE
15 years 4 months ago
Towards creative design using collaborative interactive genetic algorithms
— We present a computational model of creative design based on collaborative interactive genetic algorithms. We test our model on floorplanning. We guide the evolution of floor...
Juan C. Quiroz, Sushil J. Louis, Amit Banerjee, Se...
HAIS
2010
Springer
15 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
KBSE
2007
IEEE
15 years 4 months ago
Effective memory protection using dynamic tainting
Programs written in languages that provide direct access to memory through pointers often contain memory-related faults, which may cause non-deterministic failures and even securi...
James A. Clause, Ioannis Doudalis, Alessandro Orso...
MMSEC
2005
ACM
274views Multimedia» more  MMSEC 2005»
15 years 3 months ago
LSB steganalysis based on high-order statistics
We propose a general framework for the detection of the LSB steganography using digital media files as cover objects. The new framework exploits high-order statistics of the samp...
Sorina Dumitrescu, Xiaolin Wu
DAC
1998
ACM
15 years 10 months ago
Policy Optimization for Dynamic Power Management
Dynamic power management schemes (also called policies) can be used to control the power consumption levels of electronic systems, by setting their components in different states,...
Giuseppe A. Paleologo, Luca Benini, Alessandro Bog...