Back to Results
First PageMeta Content
Subroutines / Theoretical computer science / Software bugs / Recursion / Call graph / Compiler construction / Stack / Buffer overflow / Call stack / Computer programming / Software engineering / Computing


Efficient Context-Sensitive Intrusion Detection Jonathon T. Giffin Somesh Jha Barton P. Miller
Add to Reading List

Document Date: 2004-11-17 13:32:45


Open Document

File Size: 266,38 KB

Share Result on Facebook

City

Abstract Model / Introduction Host / /

/

Event

Product Recall / Product Issues / /

Facility

Sensitive Intrusion Detection Jonathon T. Giffin Somesh Jha Barton P. Miller Computer Sciences Department University of Wisconsin / /

IndustryTerm

intrusion detection systems / call-site / function call site / post* algorithm / call site / attack tool / /

OperatingSystem

UNIX / L3 / Solaris / /

Organization

Lawrence Livermore National Lab / office of Naval Research / National Science Foundation / Efficient Context-Sensitive Intrusion Detection Jonathon T. Giffin Somesh Jha Barton P. Miller Computer Sciences Department University / U.S. Government / Department of Energy / University of Wisconsin / Madison / /

Person

Lawrence Livermore / Jonathon T. Giffin Somesh Jha Barton / /

/

Position

Dyck model / operational cost / Dean / NFA model / depending upon the program / security analyst / representative data sets / /

Product

Dyck / /

ProgrammingLanguage

C / /

ProvinceOrState

Manitoba / /

Technology

RAM / UNIX / post* algorithm / cmp / finite state machine / PDA / /

SocialTag