Hesham Altwaijry

Learn More
In recent y ears computer applications have increased in their computational complexity. The industry-wide usage of performance benchmarks, such as SPECmarks, forces processor designers to pay particular attention to implementation of the oating point unit, or FPU. Special purpose applications, such as high performance graphics rendering systems, have(More)
—An Intrusion detection system (IDS) is an important network security component that is used to monitor network traffic and detect attack attempts. A signature based intrusion detection system relies on a set of predefined signatures to detect an attack. Due to " zero-day " attacks (i.e. new unknown attacks) conventional IDS will not be able to detect these(More)
  • 1