Skip to main content
This paper deals with a method able to provide a microprocessor-based system with safety capabilities by modifying the source code of the executed application, only. The method exploits a set of transformations which can automatically be... more
    • by 
    •   2  
      Fault InjectionSoftware Fault Tolerance
    • by 
    • by 
    • Mobile Ad Hoc Networks
Intrusions are very common problem in the present scenario. To get rid of the intrusions we have the intrusion detection systems but we need to maintain the performance of the intrusion detection systems. For the intrusion detection... more
    • by 
In today's era detection of security threats that are commonly referred to as intrusion, has become a very important and critical issue in network, data and information security. Highly confidential data of various organizations are... more
    • by 
The security of information and data is a critical issue in a computer networked environment. In our society computer networks are used to store proprietary information and to provide services for organizations and society. So in order to... more
    • by 
Nowadays, detection of security threats, commonly referred to as intrusion, has become a very important and critical issue in network, data and information security. Therefore, an intrusion detection system (IDS) has become a very... more
    • by 
An intrusion detection (ID) technique classifies the incoming network traffic, represented as a feature vector, into anomalous or normal traffic by a classification method. In practice, it has been observed that the high dimensionality of... more
    • by