Sciweavers

37 search results - page 6 / 8
» Outside the Closed World: On Using Machine Learning for Netw...
Sort
View
MTA
2007
113views more  MTA 2007»
13 years 4 months ago
A framework for a video analysis tool for suspicious event detection
This paper proposes a framework to aid video analysts in detecting suspicious activity within the tremendous amounts of video data that exists in today’s world of omnipresent su...
Gal Lavee, Latifur Khan, Bhavani M. Thuraisingham
ITICSE
2009
ACM
13 years 11 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
13 years 10 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 5 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
HAIS
2010
Springer
13 years 10 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...