Sciweavers

2269 search results - page 161 / 454
» Behavioral Intrusion Detection
Sort
View
PAM
2009
Springer
15 years 11 months ago
Monitoring the Bittorrent Monitors: A Bird's Eye View
Abstract. Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as ...
Georgos Siganos, Josep M. Pujol, Pablo Rodriguez
IEEEIAS
2009
IEEE
15 years 11 months ago
Detecting Insider Attacks Using Non-negative Matrix Factorization
—It is a fact that vast majority of attention is given to protecting against external threats, which are considered more dangerous. However, some industrial surveys have indicate...
Jan Platos, Václav Snásel, Pavel Kr&...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 11 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
122
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 4 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
15 years 11 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...