dc.contributor.author |
El-Ghali, Marwa Mohamad |
dc.date.accessioned |
2012-06-13T07:14:00Z |
dc.date.available |
2012-06-13T07:14:00Z |
dc.date.issued |
2008 |
dc.identifier.uri |
http://hdl.handle.net/10938/7720 |
dc.description |
Thesis (M.S.)--American University of Beirut, Dept. of Computer Science, 2008.;"Advisor : Dr. Wassim Masri, Assistant Professor, Computer Science--Member of Committee : Dr. Paul Attie, Associate Professor, Computer Science--Member of Committee : Dr. Haida |
dc.description |
Bibliography : leaves 66-72. |
dc.description.abstract |
Intrusion detection systems are security mechanisms designed to detect unwanted manipulations and malicious behavior that could compromise the security of a com puter system or, as in this case, a software application. The aim is to develop such a system |
dc.format.extent |
x, 85 leaves : col. ill. 30 cm. |
dc.language.iso |
eng |
dc.relation.ispartof |
Theses, Dissertations, and Projects |
dc.subject.classification |
T:005174 AUBNO |
dc.subject.lcsh |
Computer security -- Computer programs |
dc.title |
Exploiting execution profiles for automatic generation of vulnerability-based signatures - by Marwa Mohamad El-Ghali |
dc.type |
Thesis |
dc.contributor.department |
American University of Beirut. Faculty of Arts and Sciences. Department of Computer Science |