Sciweavers

2269 search results - page 198 / 454
» Behavioral Intrusion Detection
Sort
View
160
Voted
JNW
2008
83views more  JNW 2008»
15 years 5 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
INFOCOM
2002
IEEE
15 years 10 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
CHI
2005
ACM
16 years 5 months ago
WebGazeAnalyzer: a system for capturing and analyzing web reading behavior using eye gaze
Capturing and analyzing the detailed eye movements of a user while reading a web page can reveal much about the ways in which web reading occurs. The WebGazeAnalyzer system descri...
David Beymer, Daniel M. Russell
112
Voted
ECBS
2000
IEEE
99views Hardware» more  ECBS 2000»
15 years 9 months ago
Enhancing Architectural Mismatch Detection with Assumptions
Detecting software architecture inconsistencies is a critical issue in software design. Software systems are described in terms of components, component behavior and interaction a...
Sebastián Uchitel, Daniel Yankelevich
EUSFLAT
2003
107views Fuzzy Logic» more  EUSFLAT 2003»
15 years 6 months ago
Decision-theoretic approaches in fuzzy rule generation for diagnosis and fault detection problems
A typical task in technical fault detection or medical diagnosis problems is to discriminate normal behavior from one or more types of abnormal behavior by means of different meas...
Sebastian Beck, Ralf Mikut, Jens Jäkel, Georg...