Sciweavers

6844 search results - page 1244 / 1369
» Web Service Security
Sort
View
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
14 years 12 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
14 years 12 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
14 years 11 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
CAINE
2008
14 years 11 months ago
Towards Multiservice Sensor Networks
Sensor networks have been used in many applications such as health monitoring, structural monitoring, transportation networks, weather prediction, and border security. In most of ...
Rabie Ramadan, Bilal I. AlQudah
DIMVA
2007
14 years 11 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
« Prev « First page 1244 / 1369 Last » Next »