Sciweavers

33 search results - page 3 / 7
» Exploiting Pattern Relationship for Intrusion Detection
Sort
View
CCS
2010
ACM
13 years 5 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
RAID
2009
Springer
14 years 1 days ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
WSCG
2001
141views more  WSCG 2001»
13 years 6 months ago
Exploiting Eigenvalues of the Hessian Matrix for Volume Decimation
In recent years the Hessian matrix and its eigenvalues became important in pattern recognition. Several algorithms based on the information they provide have been introduced. We r...
Jirí Hladuvka, Andreas König, Eduard G...
TEC
2002
166views more  TEC 2002»
13 years 5 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 5 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...