Sciweavers

1013 search results - page 20 / 203
» Environment-Sensitive Intrusion Detection
Sort
View
99
Voted
IWIA
2003
IEEE
15 years 9 months ago
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection
Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn
136
Voted
CIS
2005
Springer
15 years 9 months ago
Computational Intelligence for Network Intrusion Detection: Recent Contributions
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
Asim Karim
120
Voted
IJCNN
2000
IEEE
15 years 8 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
207
Voted
MOBICOM
2000
ACM
15 years 8 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
131
Voted
OTM
2007
Springer
15 years 9 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...