Exploiting execution profiles for automatic generation of vulnerability-based signatures - by Marwa Mohamad El-Ghali
Abstract
Intrusion detection systems are security mechanisms designed to detect unwanted manipulations and malicious behavior that could compromise the security of a com puter system or, as in this case, a software application. The aim is to develop such a system
Description
Thesis (M.S.)--American University of Beirut, Dept. of Computer Science, 2008.;"Advisor : Dr. Wassim Masri, Assistant Professor, Computer Science--Member of Committee : Dr. Paul Attie, Associate Professor, Computer Science--Member of Committee : Dr. Haida
Bibliography : leaves 66-72.
Bibliography : leaves 66-72.