Sciweavers

1013 search results - page 2 / 203
» Storage-Based Intrusion Detection
Sort
View
ACMSE
2004
ACM
13 years 10 months ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart
ICICS
2003
Springer
13 years 10 months ago
A Compound Intrusion Detection Model
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfe...
SAINT
2003
IEEE
13 years 10 months ago
Challenges in Intrusion Detection for Wireless Ad-hoc Networks
This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detectio...
Paul Brutch, Calvin Ko
ACSAC
2010
IEEE
13 years 3 months ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna
FEGC
2009
94views Biometrics» more  FEGC 2009»
13 years 3 months ago
Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams
Wei Wang 0012, Thomas Guyet, Rene Quiniou, Marie-O...