نتایج جستجو برای: masquerade syndrome

تعداد نتایج: 622609  

2003
Jennifer Black Philip Koopman

Cost and efficiency concerns can force distributed embedded systems to use a single network for both critical and non-critical messages. Such designs must protect against masquerading faults caused by defects in and failures of non-critical network processes. Cyclic Redundancy Codes (CRCs) offer protection against random bit errors caused by environmental interference and some hardware faults, ...

Journal: :CoRR 2006
Charis Ermopoulos William Yurcik

In the UNIX/Linux environment the kernel can log every command process created by every user with process accounting. Thus process accounting logs have many potential uses, particularly the monitoring and forensic investigation of security events. Previous work successfully leveraged the use of process accounting logs to identify a difficult to detect and damaging intrusion against high perform...

Journal: :Archives of Otolaryngology–Head & Neck Surgery 2006

Journal: :International Journal of Language and Literature 2017

Journal: :JoWUA 2010
Malek Ben Salem Salvatore J. Stolfo

A masquerade attack is a consequence of identity theft. In such attacks, the impostor impersonates a legitimate insider while performing illegitimate activities. These attacks are very hard to detect and can cause considerable damage to an organization. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. In this paper, we investigate the pe...

Journal: :International Journal of Research in Medical Sciences 2020

Journal: :Saudi Journal of Gastroenterology 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید