Loading...
  • Home
  • Search Results
363-364 of 4327 Papers

INTRUSION DETECTION AND PREVENTION SYSTEM

Published In: INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, COMMUNICATION AND NETWORKS
Author(s): DAYAMA MEETA , PALIKA JAJOO

Abstract: As the importance of computers are increasingly integrated into the systems the ability to detect intruders in computer systems also increases as we rely on for the correct functioning of society.Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection System (IDS). There are two basic approaches: anomaly detection and misuse detection. Both have naturally scaled to use in distributed systems and networks. This paper reviews the history of research in intrusion detection as performed in software in the context of operating systems for a single computer, a distributed system, or a network of computers.

  • Publication Date: 03-Jun-2011
  • DOI: 10.15224/978-981-07-1847-3-1027
  • Views: 0
  • Downloads: 0

IMPLEMENTATION, ANALYSIS AND APPLICATION OF RETROACTIVE DATA STRUCTURES

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): PRAKHAR PANWARIA , SUNEETA AGARWAL

Abstract: Retroactive data structures, introduced by Demaine, Iacono and Langerman [1], represent a model through which operations can be performed on a data structure in past time. Here, in this paper, we focus on the data structures for which retroactivity hasn’t been implemented yet and the enhancements in existing Retroactive data structures. Besides going through the data structures used for their implementation, we also analyze their performance and demonstrate their usefulness through real life use-cases and applications.

  • Publication Date: 03-Feb-2020
  • DOI: 10.15224/978-981-07-1403-1-247
  • Views: 0
  • Downloads: 0