Sciweavers

733 search results - page 16 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
JAIHC
2010
205views more  JAIHC 2010»
14 years 10 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi
EHCI
2001
15 years 1 months ago
Detecting Multiple Classes of User Errors
Abstract. Systematic user errors commonly occur in the use of interactive systems. We describe a formal reusable user model implemented in higher-order logic that can be used for m...
Paul Curzon, Ann Blandford
SBIA
2004
Springer
15 years 5 months ago
Reasoning About Requirements Evolution Using Clustered Belief Revision
During the development of system requirements, software system specifications are often inconsistent. Inconsistencies may arise for different reasons, for example, when multiple...
Odinaldo Rodrigues, Artur S. d'Avila Garcez, Aless...
CIA
2004
Springer
15 years 5 months ago
Reasoning About Communication - A Practical Approach Based on Empirical Semantics
Given a specification of communication rules in a multiagent system (in the form of protocols, ACL semantics, etc.), the question of how to design appropriate agents that can oper...
Felix A. Fischer, Michael Rovatsos
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 5 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli