Sciweavers

33 search results - page 4 / 7
» Exploiting Pattern Relationship for Intrusion Detection
Sort
View
INFOCOM
2012
IEEE
11 years 8 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
ACSAC
2008
IEEE
14 years 22 days ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
GECCO
2007
Springer
158views Optimization» more  GECCO 2007»
14 years 12 days ago
A novel generative encoding for exploiting neural network sensor and output geometry
A significant problem for evolving artificial neural networks is that the physical arrangement of sensors and effectors is invisible to the evolutionary algorithm. For example,...
David B. D'Ambrosio, Kenneth O. Stanley
JCDL
2010
ACM
259views Education» more  JCDL 2010»
13 years 11 months ago
Exploiting time-based synonyms in searching document archives
Query expansion of named entities can be employed in order to increase the retrieval effectiveness. A peculiarity of named entities compared to other vocabulary terms is that they...
Nattiya Kanhabua, Kjetil Nørvåg
IAT
2010
IEEE
13 years 4 months ago
Intention Recognition with Event Calculus Graphs
Intention recognition has significant applications in ambient intelligence, for example in assisted living and care of the elderly, in games and in intrusion and other crime detec...
Fariba Sadri