Sciweavers

2 search results - page 1 / 1
» A Fuzzy Model for the Composition of Intrusion Detectors
Sort
View
SEC
2008
13 years 6 months ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero
AIM
2002
13 years 4 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe