Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2020
Using MLPA for smart mushroom farm monitoring system based on IoT
International Journal of Networking and Virtual Organisations (IJNVO), Volume 22, Issue 4Pages 334–346https://doi.org/10.1504/ijnvo.2020.107559Mushroom has turned out to be a standout amongst the most fundamental consumable items in our everyday life. To increase mushroom production and to reduce manual work smart mushroom monitoring has been proposed with the assistance of internet of things (...
- ArticleDecember 2009
Online Signature Generation for Windows Systems
ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications ConferencePages 289–298https://doi.org/10.1109/ACSAC.2009.34In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployable as an "always on'' component on production systems. To achieve this goal, it ...
- doctoral_thesisJanuary 2004
Enforcement techniques for expressive security policies
Execution monitoring is a powerful practical technique for enforcement of security policies. In this dissertation, we discuss some of the limitations of existing execution monitoring mechanisms, and develop new techniques that suitably adapt execution ...
- proceedingAugust 2003
NSPW '03: Proceedings of the 2003 workshop on New security paradigms
Welcome to the Proceedings of the New Security Paradigms Workshop 2003. This was the twelfth year of our very special workshop. The ideas resulting from this year's workshop are presented here for your consideration and enjoyment.If you find the work ...
- ArticleMay 2001
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
Abstract: Forrest et al. introduced a new intrusion detection approach that identifies anomalous sequences of system calls executed by programs. Since their work, anomaly detection on system call sequences has become perhaps the most successful approach ...