نتایج جستجو برای: overflow detection
تعداد نتایج: 572254 فیلتر نتایج به سال:
The syntax of application layer protocols carries valuable information for network intrusion detection. Hence, the majority of modern IDS perform some form of protocol analysis to refine their signatures with application layer context. Protocol analysis, however, has been mainly used for misuse detection, which limits its application for the detection of unknown and novel attacks. In this contr...
Mobile ad hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic overflow. Traditionally, this was done through DropTail policy where the node drops the incoming packets to its queues during overflow condition. Many studies s...
Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the ability to handle the congestion in its queues during traffic overflow. Traditionally, this was done through Drop-Tail policy where the node drops the incoming packets to its queues during overflow condition. Many studies ...
One difficulty encountered by intrusion and misuse detection systems is a lack of application level audit data. Frequently, applications used are written by third parties and may be distributed only in a binary format. In this paper we present a technique to generate application level audit data using library interposition. Interposition allows the generation of audit data without needing to re...
In line with the discussion in NWG/RFC #48, we felt that two types of errors should be distinguished. One is a real error, such as an RFC composed of two send sockets. This type of error can only be generated by a broken NCP. In the absence of hardware and software bugs, these events should never occur; the correct response upon detection of such an event was outlined in the description of the ...
This paper describes StackFences, a run-time technique for detecting overflows in local variables in C programs. This technique is different from all others developed so far because it tries to detect explicit overflow occurrences, instead of detecting if a particular stack value, namely a return address, was corrupted because of a stack overflow. Thus, StackFences is useful not only for detect...
Center for Wireless Communications, University of California San Diego 9500 Gilman Drive – La Jolla, CA 92093-0407, USA – fax: +1-619-534-2486 e-mail: [email protected] – http://www-cwc.ucsd.edu/~zorzi Abstract— In this paper, we consider a data transmission system over a wireless channel, where packets are queued at the transmitter. ARQ is employed as the error control scheme, by which packet...
This article analyzes the emergence of critique "environmental coloniality" Spain’s Francoist dictatorship, and how it connected to foundation several environmental injustice struggles in Spain. coloniality can be observed contemporary critiques "internal colonialism", which arose during 1970s. Green intellectuals, such as Mario Gaviria, went far describe three types colonialism based on classi...
Effects of verapamil, diltiazem and nicardipine on tritium overflow and contraction evoked by transmural nerve stimulation (TNS) were evaluated using canine saphenous vein strips preincubated with [3H]norepinephrine. External Ca2+ was required for both tritium overflow and contraction evoked by TNS. All the Ca antagonists tested significantly increased the spontaneous overflow of tritium in a c...
Global myocardial low flow ischemia results in an uniform suppression of norepinephrine (NE) overflow from the heart. We hypothesized that opening of neuronal ATP-sensitive potassium (K(ATP)) channels as well as activation of the extraneuronal monoamine transporter (EMT) mediates attenuation of NE overflow during low flow ischemia. Isolated rat hearts were subjected to low coronary flow of 0.4 ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید