Sciweavers

8177 search results - page 282 / 1636
» Detecting System Emulators
Sort
View
ICDCS
2003
IEEE
15 years 8 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
NDSS
2000
IEEE
15 years 7 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
SRDS
1997
IEEE
15 years 6 months ago
Fault Detection Using Hints from the Socket Layer
This paper describes a fault detection mechanism that uses the error codes returned by the stream sockets to locate process failures. Since these errors are generated automaticall...
Nuno Neves, W. Kent Fuchs
107
Voted
NIPS
1998
15 years 4 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp
122
Voted
AAAI
1998
15 years 4 months ago
Automated Intelligent Pilots for Combat Flight Simulation
TacAir-Soar is an intelligent, rule-based system that generates believable human-like" behavior for military simulations. The innovation of the application is primarily a mat...
Randolph M. Jones, John E. Laird, Paul E. Nielsen