Sciweavers

995 search results - page 3 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
VIIP
2001
13 years 7 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
EUROPAR
2004
Springer
13 years 9 months ago
Overhead Compensation in Performance Profiling
Measurement-based profiling introduces intrusion in program execution. Intrusion effects can be mitigated by compensating for measurement overhead. Techniques for compensation anal...
Allen D. Malony, Sameer Shende
OTM
2007
Springer
13 years 12 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...
IJCNN
2000
IEEE
13 years 10 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
CCGRID
2006
IEEE
13 years 12 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu