This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
In this paper we propose a method for on-line max auditing of dynamic statistical databases. The method extends the Bayesian approach presented in [2], [3] and [4] for static data...
Abstract— Community discovery has drawn significant research interests among researchers from many disciplines for its increasing application in multiple, disparate areas, inclu...
Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of ...
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...