Sciweavers

642 search results - page 62 / 129
» Detecting Spoofed Packets
Sort
View
122
Voted
AINA
2007
IEEE
15 years 11 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 10 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
CONEXT
2007
ACM
15 years 6 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
165
Voted
CIIT
2007
161views Communications» more  CIIT 2007»
15 years 6 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
173
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Error detection scheme based on fragile watermarking for H.264/AVC
Compressed video bitstreams are very sensitive to transmission errors. If we lose packets or receive them with errors during transmission, not only the current frame will be corru...
Man-Geun Ko, Jae-Won Suh, Jang-Eui Hong