The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the...
—Survivability modeling and evaluation have gained increasing importance. Most existing models assume that the distributions for transitions between states are exponential. Howev...
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...