Sciweavers

319 search results - page 48 / 64
» A Compound Intrusion Detection Model
Sort
View
120
Voted
CSB
2003
IEEE
15 years 8 months ago
A Probabilistic Model for Identifying Protein Names and their Name Boundaries
This paper proposes a method for identifying protein names in biomedical texts with an emphasis on detecting protein name boundaries. We use a probabilistic model which exploits s...
Kazuhiro Seki, Javed Mostafa
137
Voted
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 10 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
123
Voted
SAC
2010
ACM
15 years 10 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
125
Voted
AIIA
2005
Springer
15 years 9 months ago
Experimental Evaluation of Hierarchical Hidden Markov Models
Building profiles for processes and for interactive users is a important task in intrusion detection. This paper presents the results obtained with a Hierarchical Hidden Markov Mo...
Attilio Giordana, Ugo Galassi, Lorenza Saitta
160
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Strong Barrier Coverage with Directional Sensors
Abstract—The barrier coverage model was proposed for applications in which sensors are deployed for intrusion detection. In this paper, we study a strong barrier coverage problem...
Li Zhang, Jian Tang, Weiyi Zhang