نتایج جستجو برای: overflow detection

تعداد نتایج: 572254  

2008
Patrick Düssel Christian Gehl Pavel Laskov Konrad Rieck

The syntax of application layer protocols carries valuable information for network intrusion detection. Hence, the majority of modern IDS perform some form of protocol analysis to refine their signatures with application layer context. Protocol analysis, however, has been mainly used for misuse detection, which limits its application for the detection of unknown and novel attacks. In this contr...

Journal: :IJBDCN 2007
Essam Natsheh Adznan B. Jantan Sabira Khatun Subramaniam Shamala

Mobile ad hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic overflow. Traditionally, this was done through DropTail policy where the node drops the incoming packets to its queues during overflow condition. Many studies s...

Journal: :Int. Arab J. Inf. Technol. 2007
Essam Natsheh Adznan B. Jantan Sabira Khatun Subramaniam Shamala

Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic overflow. Traditionally, this was done through Drop-Tail policy where the node drops the incoming packets to its queues during overflow condition. Many studies ...

1999
Benjamin A. Kuperman Eugene Spafford

One difficulty encountered by intrusion and misuse detection systems is a lack of application level audit data. Frequently, applications used are written by third parties and may be distributed only in a binary format. In this paper we present a technique to generate application level audit data using library interposition. Interposition allows the generation of audit data without needing to re...

2002
John Newkirk

In line with the discussion in NWG/RFC #48, we felt that two types of errors should be distinguished. One is a real error, such as an RFC composed of two send sockets. This type of error can only be generated by a broken NCP. In the absence of hardware and software bugs, these events should never occur; the correct response upon detection of such an event was outlined in the description of the ...

2004
André Zúquete

This paper describes StackFences, a run-time technique for detecting overflows in local variables in C programs. This technique is different from all others developed so far because it tries to detect explicit overflow occurrences, instead of detecting if a particular stack value, namely a return address, was corrupted because of a stack overflow. Thus, StackFences is useful not only for detect...

Journal: :IEEE Trans. Vehicular Technology 2003
Michele Zorzi

Center for Wireless Communications, University of California San Diego 9500 Gilman Drive – La Jolla, CA 92093-0407, USA – fax: +1-619-534-2486 e-mail: [email protected] – http://www-cwc.ucsd.edu/~zorzi Abstract— In this paper, we consider a data transmission system over a wireless channel, where packets are queued at the transmitter. ARQ is employed as the error control scheme, by which packet...

Journal: :Perspectivas 2021

This article analyzes the emergence of critique "environmental coloniality" Spain’s Francoist dictatorship, and how it connected to foundation several environmental injustice struggles in Spain. coloniality can be observed contemporary critiques "internal colonialism", which arose during 1970s. Green intellectuals, such as Mario Gaviria, went far describe three types colonialism based on classi...

Journal: :Japanese journal of pharmacology 1984
Y Takata H Kato

Effects of verapamil, diltiazem and nicardipine on tritium overflow and contraction evoked by transmural nerve stimulation (TNS) were evaluated using canine saphenous vein strips preincubated with [3H]norepinephrine. External Ca2+ was required for both tritium overflow and contraction evoked by TNS. All the Ca antagonists tested significantly increased the spontaneous overflow of tritium in a c...

Journal: :The Journal of pharmacology and experimental therapeutics 2004
Christof Burgdorf Andreas Dendorfer Thomas Kurz Edgar Schömig Ines Stölting Frank Schütte Gert Richardt

Global myocardial low flow ischemia results in an uniform suppression of norepinephrine (NE) overflow from the heart. We hypothesized that opening of neuronal ATP-sensitive potassium (K(ATP)) channels as well as activation of the extraneuronal monoamine transporter (EMT) mediates attenuation of NE overflow during low flow ischemia. Isolated rat hearts were subjected to low coronary flow of 0.4 ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید