Sciweavers

197 search results - page 14 / 40
» A Deployment Value Model for Intrusion Detection Sensors
Sort
View
129
Voted
CIA
2008
Springer
15 years 1 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
ICDCS
2008
IEEE
15 years 6 months ago
Performance Analysis of Group Based Detection for Sparse Sensor Networks
In this paper, we analyze the performance of group based detection in sparse sensor networks, when the system level detection decision is made based on the detection reports gener...
Jingbin Zhang, Gang Zhou, Sang Hyuk Son, John A. S...
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
15 years 11 months ago
Distributed deviation detection in sensor networks
Sensor networks have recently attracted much attention, because of their potential applications in a number of different settings. The sensors can be deployed in large numbers in ...
Themistoklis Palpanas, Dimitris Papadopoulos, Vana...
HAIS
2010
Springer
15 years 4 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
109
Voted
TPDS
2010
113views more  TPDS 2010»
14 years 6 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...