This paper deals with a method able to provide a microprocessor-based system with safety capabilities by modifying the source code of the executed application, only. The method exploits a set of transformations which can automatically be... more
Intrusions are very common problem in the present scenario. To get rid of the intrusions we have the intrusion detection systems but we need to maintain the performance of the intrusion detection systems. For the intrusion detection... more
- by Dr. Amrita
In today's era detection of security threats that are commonly referred to as intrusion, has become a very important and critical issue in network, data and information security. Highly confidential data of various organizations are... more
- by Dr. Amrita
The security of information and data is a critical issue in a computer networked environment. In our society computer networks are used to store proprietary information and to provide services for organizations and society. So in order to... more
- by Dr. Amrita
Nowadays, detection of security threats, commonly referred to as intrusion, has become a very important and critical issue in network, data and information security. Therefore, an intrusion detection system (IDS) has become a very... more
- by Dr. Amrita
An intrusion detection (ID) technique classifies the incoming network traffic, represented as a feature vector, into anomalous or normal traffic by a classification method. In practice, it has been observed that the high dimensionality of... more
- by Dr. Amrita