نتایج جستجو برای: specification based detection

تعداد نتایج: 3365367  

2013
H. H. G. Savenije

Introduction Conclusions References

1993
Christian Salzmann Bernhard Schätz

Nowadays the term of a “service” is frequently used in the discipline of modelling distributed system. However, it seems that the meaning of a service varies, depending on the domain it is used in. In this article we describe what various perceptions of the term “service” have in common and derive a formally founded definition of services that helps to specify services precisely in the context ...

Journal: :International Journal of Advanced Computer Science and Applications 2017

1982
Robert Balzer David Dyer Matthew Morgenstern Robert Neches

We have identified five such capabilities: Search, Coordination, Automation, Evolution, and Inter-User Interactions. They will be directly supported by the computing environment. Hence, each represents a “freedom” that users will enjoy without having to program them (i.e. be concerned with the details of how they are achieved). They form both the conceptual and the practical basis for this comp...

2002
Kymie M. C. Tan Kevin S. Killourhy Roy A. Maxion

Over the past decade many anomaly-detection techniques have been proposed and/or deployed to provide early warnings of cyberattacks, particularly of those attacks involving masqueraders and novel methods. To date, however, there appears to be no study which has identified a systematic method that could be used by an attacker to undermine an anomaly-based intrusion detection system. This paper s...

Journal: :International Journal of Advanced Computer Science and Applications 2018

2009
Julian L. Rrushi Ernesto Damiani

An intrusion detection ensemble, i.e. a set of diverse intrusion detection algorithms employed as a group, has been shown to outperform each one those diverse algorithms employed individually. Moving along this line, we have devised an intrusion detection ensemble that inspects network packets that flow across the process control network of a digitally controlled physical system such as a power...

2012
Hichem Sedjelmaci Sidi Mohammed Senouci Mohamed Feham

In the last years, the technological evolution in the field of Wireless Sensor Networks was impressive, which made them extremely useful in various applications (military, commercial, etc.). In such applications, it is essential to protect the sensor network from malicious attacks. This presents a demand for providing security mechanisms in these vulnerable networks. In this paper, we design a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید