Sciweavers

6574 search results - page 55 / 1315
» Current Signatures: Application
Sort
View
117
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 1 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
123
Voted
ACSAC
2009
IEEE
15 years 4 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
BIOID
2008
110views Biometrics» more  BIOID 2008»
15 years 2 months ago
An Empirical Comparison of Individual Machine Learning Techniques in Signature and Fingerprint Classification
This paper describes an empirical study to investigate the performance of a wide range of classifiers deployed in applications to classify biometric data. The study specifically re...
Marjory C. C. Abreu, Michael C. Fairhurst
TON
2010
139views more  TON 2010»
14 years 7 months ago
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
Abstract--This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applicati...
Aleaandro Finamore, Marco Mellia, Michela Meo, Dar...
EUROPKI
2007
Springer
15 years 6 months ago
E-Passports as a Means Towards the First World-Wide Public Key Infrastructure
Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless communication capability, as well as with a s...
Dimitrios Lekkas, Dimitris Gritzalis