Learn More
In addition to preventive mechanisms intrusion detection systems (IDS) are an important instrument to protect computer systems. Most IDSs used today realize the misuse detection approach. These systems analyze monitored events for occurrences of defined patterns (signatures), which indicate security violations. Up to now only little attention has been paid(More)
BACKGROUND Functional magnetic resonance imaging (fMRI) is a widely available method and is therefore progressively utilized in neurosurgical practice. This study was carried out to determine fMRI sensitivity and specificity and to emphasize the threshold dependence of fMRI data. METHODS A total of 17 consecutive patients, scheduled for surgery on(More)
Modern multi-tier application systems are generally based on high performance database systems in order to process and store business information. Containing valuable business information, these systems are highly interesting to attackers and special care needs to be taken to prevent any malicious access to this database layer. In this work we propose a(More)
Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as JavaScript are vulnerable to so-called drive-by downloads. Drive-by downloads are able to automatically infect a victim's system during a single visit of a crafted web page testing various(More)