Sciweavers

117 search results - page 2 / 24
» Detecting Security threats in the Router using Computational...
Sort
View
ACMSE
2006
ACM
13 years 7 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
CIDM
2009
IEEE
13 years 11 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
ICIP
2010
IEEE
13 years 2 months ago
A classifier based approach for the detection of potential threats in CT based Baggage Screening
Recent years have seen increased use of Computed Tomography (CT) based Unaccompanied Baggage and Package Screening (UBPS) systems for luggage examination to ensure air travel secu...
Najla Megherbi, Gregory T. Flitton, Toby P. Brecko...
INFOCOM
2006
IEEE
13 years 11 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 5 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye