Sciweavers

58 search results - page 3 / 12
» Statistical Decision Making for Authentication and Intrusion...
Sort
View
PERCOM
2005
ACM
14 years 4 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
AINA
2008
IEEE
13 years 11 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
EVOW
2009
Springer
13 years 3 months ago
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
An ever-present problem in intrusion detection technology is how to construct the patterns of (good, bad or anomalous) behaviour upon which an engine have to make decisions regardi...
Agustín Orfila, Juan M. Estévez-Tapi...
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 7 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
TSMC
2002
134views more  TSMC 2002»
13 years 4 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho