Stig Andersson

Learn More
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities discovered in software every year. The research presented in this paper extends earlier work in the area of code injection attack detection in UNIX environments. It presents a(More)
Buffer overflow attacks continue to be a major security problem and detecting attacks of this nature is therefore crucial to network security. Signature based network based intrusion detection systems (NIDS) compare network traffic to signatures modelling suspicious or attack traffic to detect network attacks. Since detection is based on pattern matching, a(More)
Most rating scales for affective disorders measure either depressive or hypomanic/manic symptoms and there are few scales for hypomania/mania in a self-rating format. We wanted to develop and validate a self-rating scale for comprehensive assessment of depressive, manic/hypomanic and mixed affective states. We developed an 18-item self-rating scale starting(More)
Intrusion detection systems (IDSs) are widely recognised as the last line of defence often used to enable incident response when intrusion prevention mechanisms are ineffective, or have been compromised. A signature based network IDS (NIDS) which operates by comparing network traffic to a database of suspicious activity patterns (known as signatures) is a(More)
Detailed physisorption data from experiment for the H(2) molecule on low-index Cu surfaces challenge theory. Recently, density functional theory (DFT) has been developed to account for nonlocal correlation effects, including van der Waals (dispersion) forces. We show that the functional vdW-DF2 gives a potential-energy curve, potential-well energy levels(More)
  • 1