نتایج جستجو برای: specification based detection
تعداد نتایج: 3365367 فیلتر نتایج به سال:
Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined patterns. The matching rules are called signatures. The definition of signatures is up to now an empirical process based on expert knowledge and experience. The analysis success and accordingly the acceptance of intrus...
The MIC-2000 96-channel dispenser was evaluated for accuracy and repeatability of dispensing 50-mul volumes of water. It was found to perform within the manufacturer's specifications for accuracy of +/-5%, but not within the limits for repeatability of +/-1%. Overall, instrument performance was found to be satisfactory for the antimicrobial susceptibility testing technique which has been implem...
Telephony systems have evolved from the Plain Old Telephony System providing only the basic functionality of making phone calls, to sophisticated systems in which many features have been introduced, providing network subscribers more control on the call establishment process. However, these facilities are confronted with a major obstacle known as the feature interaction problem. A feature inter...
Critical infrastructures provide services upon which society depends heavily; these applications are themselves dependent on distributed information systems for all aspects of their operation and so survivability of the information systems is an important issue. Fault tolerance is a key mechanism by which survivability can be achieved in these information systems. We outline a specification-bas...
Software testing mainly consists of three types of approaches i.e. specification based testing, model based testing and coding based testing. In specification based testing, major concern is to find the missing logic defects that cannot be find by using other types of testing. Specification testing mainly uncovers the specification problems in Software Requirement Specification (SRS). An approa...
Historically, relatively less emphasis has been placed on software testing in comparison with other activities, such as systems analysis and design, of the software life cycle in an undergraduate computer science or software engineering curriculum. Testing, however, is a common and important technique used to detect program faults. Thus, testing must be taught rigorously to the students. This p...
Identity theft happens frequently, especially in popular multiplayer games where cyberassets can be monetized. In this work, we propose an automatic and proactive identity theft detection model in online games. We specify the identity theft process into exploration, monetization, and theft and pose identity theft detection as a multi-class classification problem. We propose an automatic and pro...
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In this paper, we present a technique to improve the performance of packet classification of Snort, a popular open-source NIDS, based on generating native code from Snort signatures. An obvious way to generate native code ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید