Sciweavers

8177 search results - page 287 / 1636
» Detecting System Emulators
Sort
View
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 9 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
RAID
2007
Springer
15 years 9 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
CRV
2006
IEEE
99views Robotics» more  CRV 2006»
15 years 9 months ago
The McGill Object Detection Suite
Evaluation of object detection systems requires a set of test images with objects in heterogeneous scenes. Unfortunately, existing publicly available object databases provide few,...
Donovan H. Parks, Martin D. Levine
RAID
2001
Springer
15 years 7 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
NIPS
1997
15 years 4 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen