Sciweavers

839 search results - page 16 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
ICEIS
2002
IEEE
15 years 5 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
153
Voted
ICDM
2007
IEEE
140views Data Mining» more  ICDM 2007»
15 years 4 months ago
Sequential Change Detection on Data Streams
Model-based declarative queries are becoming an attractive paradigm for interacting with many data stream applications. This has led to the development of techniques to accurately...
S. Muthukrishnan, Eric van den Berg, Yihua Wu
MATA
2004
Springer
189views Communications» more  MATA 2004»
15 years 5 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
EVOW
2009
Springer
14 years 10 months ago
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
An ever-present problem in intrusion detection technology is how to construct the patterns of (good, bad or anomalous) behaviour upon which an engine have to make decisions regardi...
Agustín Orfila, Juan M. Estévez-Tapi...
120
Voted
ACSAC
2007
IEEE
15 years 6 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....