Sciweavers

2269 search results - page 70 / 454
» Behavioral Intrusion Detection
Sort
View
100
Voted
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
15 years 7 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
TEC
2002
89views more  TEC 2002»
15 years 7 days ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
EMSOFT
2005
Springer
15 years 6 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
126
Voted
IAT
2007
IEEE
15 years 7 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
87
Voted
PERVASIVE
2007
Springer
15 years 6 months ago
Intrusive and Non-intrusive Evaluation of Ambient Displays
This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?...
Xiaobin Shen, Peter Eades, Seok-Hee Hong, Andrew V...