Sciweavers

8 search results - page 1 / 2
» Hidden Processes: The Implication for Intrusion Detection
Sort
View
IAW
2003
IEEE
13 years 10 months ago
Hidden Processes: The Implication for Intrusion Detection
James Butler, Jeffrey Undercoffer, John Pinkston
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 6 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
ISSADS
2005
Springer
13 years 10 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
AIIA
2005
Springer
13 years 10 months ago
Experimental Evaluation of Hierarchical Hidden Markov Models
Building profiles for processes and for interactive users is a important task in intrusion detection. This paper presents the results obtained with a Hierarchical Hidden Markov Mo...
Attilio Giordana, Ugo Galassi, Lorenza Saitta
ICALP
2001
Springer
13 years 9 months ago
Hidden Pattern Statistics
Abstract. We consider the sequence comparison problem, also known as “hidden pattern” problem, where one searches for a given subsequence in a text (rather than a string unders...
Philippe Flajolet, Yves Guivarc'h, Wojciech Szpank...