نتایج جستجو برای: specification based detection
تعداد نتایج: 3365367 فیلتر نتایج به سال:
Introduction Conclusions References
Nowadays the term of a “service” is frequently used in the discipline of modelling distributed system. However, it seems that the meaning of a service varies, depending on the domain it is used in. In this article we describe what various perceptions of the term “service” have in common and derive a formally founded definition of services that helps to specify services precisely in the context ...
We have identified five such capabilities: Search, Coordination, Automation, Evolution, and Inter-User Interactions. They will be directly supported by the computing environment. Hence, each represents a “freedom” that users will enjoy without having to program them (i.e. be concerned with the details of how they are achieved). They form both the conceptual and the practical basis for this comp...
Over the past decade many anomaly-detection techniques have been proposed and/or deployed to provide early warnings of cyberattacks, particularly of those attacks involving masqueraders and novel methods. To date, however, there appears to be no study which has identified a systematic method that could be used by an attacker to undermine an anomaly-based intrusion detection system. This paper s...
An intrusion detection ensemble, i.e. a set of diverse intrusion detection algorithms employed as a group, has been shown to outperform each one those diverse algorithms employed individually. Moving along this line, we have devised an intrusion detection ensemble that inspects network packets that flow across the process control network of a digitally controlled physical system such as a power...
In the last years, the technological evolution in the field of Wireless Sensor Networks was impressive, which made them extremely useful in various applications (military, commercial, etc.). In such applications, it is essential to protect the sensor network from malicious attacks. This presents a demand for providing security mechanisms in these vulnerable networks. In this paper, we design a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید