Sciweavers

655 search results - page 50 / 131
» A behavioral approach to worm detection
Sort
View
IEEEIAS
2009
IEEE
15 years 4 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
IJCAI
1989
14 years 11 months ago
A Focused, Context-Sensitive Approach to Monitoring
We address two issues which arise in the task of detecting anomalous behavior in complex systems with numerous sensor channels: how to adjust alarm thresholds dynamically, within ...
Richard J. Doyle, Suzanne M. Sellers, David Atkins...
IJNSEC
2007
171views more  IJNSEC 2007»
14 years 9 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
WAIM
2010
Springer
14 years 7 months ago
An Efficient Approach for Mining Segment-Wise Intervention Rules in Time-Series Streams
Huge time-series stream data are collected every day from many areas, and their trends may be impacted by outside events, hence biased from its normal behavior. This phenomenon is ...
Yue Wang, Jie Zuo, Ning Yang, Lei Duan, Hong-Jun L...
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 4 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran