Sciweavers

935 search results - page 34 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 5 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
15 years 4 months ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel
SERP
2004
15 years 1 months ago
The Architectural Design of FRUIT: A Family of Retargetable User Interface Tools
Forms-based user interfaces are widely used means for human-computer interaction. However, it is difficult to exploit software reuse in forms-based systems because the systems ten...
Yi Liu, H. Conrad Cunningham, Hui Xiong
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 12 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
15 years 1 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin