Exploiting execution profiles for automatic generation of vulnerability-based signatures - by Marwa Mohamad El-Ghali

dc.contributor.authorEl-Ghali, Marwa Mohamad
dc.contributor.departmentDepartment of Computer Science
dc.contributor.facultyFaculty of Arts and Sciences
dc.contributor.institutionAmerican University of Beirut
dc.date2008
dc.date.accessioned2012-06-13T07:14:00Z
dc.date.available2012-06-13T07:14:00Z
dc.date.issued2008
dc.descriptionThesis (M.S.)--American University of Beirut, Dept. of Computer Science, 2008.;"Advisor : Dr. Wassim Masri, Assistant Professor, Computer Science--Member of Committee : Dr. Paul Attie, Associate Professor, Computer Science--Member of Committee : Dr. Haida
dc.descriptionBibliography : leaves 66-72.
dc.description.abstractIntrusion detection systems are security mechanisms designed to detect unwanted manipulations and malicious behavior that could compromise the security of a com puter system or, as in this case, a software application. The aim is to develop such a system
dc.format.extentx, 85 leaves : col. ill. 30 cm.
dc.identifier.urihttp://hdl.handle.net/10938/7720
dc.language.isoen
dc.relation.ispartofTheses, Dissertations, and Projects
dc.subject.classificationT:005174 AUBNO
dc.subject.lcshComputer security -- Computer programs
dc.titleExploiting execution profiles for automatic generation of vulnerability-based signatures - by Marwa Mohamad El-Ghali
dc.typeThesis

Files