Sciweavers

273 search results - page 2 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
CW
2003
IEEE
13 years 11 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
VIIP
2001
13 years 7 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
AINA
2007
IEEE
14 years 18 days ago
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Natalia Stakhanova, Samik Basu, Johnny Wong
TSMC
2002
134views more  TSMC 2002»
13 years 5 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
MOBICOM
2000
ACM
13 years 10 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee