Login / Signup
Stream cipher hash based execution monitoring (SCHEM) framework for intrusion detection on embedded processors.
Ameya Chaudhari
Jacob A. Abraham
Published in:
IOLTS (2012)
Keyphrases
</>
intrusion detection
intrusion detection system
anomaly detection
network security
embedded processors
network traffic
stream cipher
network intrusion detection
real time
information security
network intrusions
data mining
feature extraction
query processing
lightweight
hash functions