Sciweavers

765 search results - page 97 / 153
» Detecting Anomalies and Intruders
Sort
View
ISCAPDCS
2007
15 years 1 months ago
Distributed algorithms for dynamic coverage in sensor networks
The coverage problem is of great interest for many sensor network applications, for example, detection of intruders in the sensor field. Topological changes in sensor networks ma...
Lan Lin, Hyunyoung Lee
CCCG
2009
15 years 1 months ago
Inapproximability of the Perimeter Defense Problem
We model the problem of detecting intruders using a set of infrared beams by the perimeter defense problem: given a polygon P, find a minimum set of edges S of the polygon such th...
Evangelos Kranakis, Danny Krizanc, Lata Narayanan,...
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
15 years 4 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ICICS
2003
Springer
15 years 5 months ago
A Compound Intrusion Detection Model
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfe...
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
15 years 6 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas