Exploiting execution profiles for automatic generation of vulnerability-based signatures - by Marwa Mohamad El-Ghali

Loading...
Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Intrusion detection systems are security mechanisms designed to detect unwanted manipulations and malicious behavior that could compromise the security of a com puter system or, as in this case, a software application. The aim is to develop such a system

Description

Thesis (M.S.)--American University of Beirut, Dept. of Computer Science, 2008.;"Advisor : Dr. Wassim Masri, Assistant Professor, Computer Science--Member of Committee : Dr. Paul Attie, Associate Professor, Computer Science--Member of Committee : Dr. Haida
Bibliography : leaves 66-72.

Keywords

Citation

Endorsement

Review

Supplemented By

Referenced By