Exploiting execution profiles for automatic generation of vulnerability-based signatures - by Marwa Mohamad El-Ghali
| dc.contributor.author | El-Ghali, Marwa Mohamad | |
| dc.contributor.department | Department of Computer Science | |
| dc.contributor.faculty | Faculty of Arts and Sciences | |
| dc.contributor.institution | American University of Beirut | |
| dc.date | 2008 | |
| dc.date.accessioned | 2012-06-13T07:14:00Z | |
| dc.date.available | 2012-06-13T07:14:00Z | |
| dc.date.issued | 2008 | |
| dc.description | Thesis (M.S.)--American University of Beirut, Dept. of Computer Science, 2008.;"Advisor : Dr. Wassim Masri, Assistant Professor, Computer Science--Member of Committee : Dr. Paul Attie, Associate Professor, Computer Science--Member of Committee : Dr. Haida | |
| dc.description | Bibliography : leaves 66-72. | |
| dc.description.abstract | Intrusion detection systems are security mechanisms designed to detect unwanted manipulations and malicious behavior that could compromise the security of a com puter system or, as in this case, a software application. The aim is to develop such a system | |
| dc.format.extent | x, 85 leaves : col. ill. 30 cm. | |
| dc.identifier.uri | http://hdl.handle.net/10938/7720 | |
| dc.language.iso | en | |
| dc.relation.ispartof | Theses, Dissertations, and Projects | |
| dc.subject.classification | T:005174 AUBNO | |
| dc.subject.lcsh | Computer security -- Computer programs | |
| dc.title | Exploiting execution profiles for automatic generation of vulnerability-based signatures - by Marwa Mohamad El-Ghali | |
| dc.type | Thesis |