Sciweavers

123 search results - page 2 / 25
» A network intrusion detection method using independent compo...
Sort
View
IJISEC
2008
188views more  IJISEC 2008»
13 years 4 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
IJCNN
2000
IEEE
13 years 10 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
ADBIS
2006
Springer
200views Database» more  ADBIS 2006»
13 years 11 months ago
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data
The anomaly detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. This paper is concerned with the prob...
Zakia Ferdousi, Akira Maeda
MVA
2007
189views Computer Vision» more  MVA 2007»
13 years 7 months ago
Localization of Optic Disk Using Independent Component Analysis and Modified Structural Similarity Measure
Localization and segmentation of Optic Disk (OD) is an important prerequisite for automatic detection of Diabetic Retinopathy (DR) from digital retinal fundus images. Considerable...
S. Balasubramanian, Srikanth Khanna, V. Chandrasek...
ICAC
2009
IEEE
14 years 15 days ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...