Sciweavers

2269 search results - page 35 / 454
» Behavioral Intrusion Detection
Sort
View
70
Voted
ICIP
2002
IEEE
16 years 5 months ago
Robust real-time intrusion detection with fuzzy classification
Giovanni Milanesi, Augusto Sarti, Stefano Tubaro
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 9 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
CAV
2005
Springer
139views Hardware» more  CAV 2005»
15 years 9 months ago
The Orchids Intrusion Detection Tool
ORCHIDS is an intrusion detection tool based on techniques for fast, on-line model-checking. Temporal formulae are taken from a temporal logic tailored to the description of intrus...
Julien Olivain, Jean Goubault-Larrecq
SP
2006
IEEE
123views Security Privacy» more  SP 2006»
15 years 10 months ago
A Framework for the Evaluation of Intrusion Detection Systems
Classification accuracy in intrusion detection systems (IDSs) deals with such fundamental problems as how to compare two or more IDSs, how to evaluate the performance of an IDS, ...
Alvaro A. Cárdenas, John S. Baras, Karl Sea...
IRI
2005
IEEE
15 years 9 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...