Sciweavers

2564 search results - page 45 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
IDEAL
2005
Springer
15 years 5 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
CHI
1999
ACM
15 years 4 months ago
Nomadic Radio: Scaleable and Contextual Notification for Wearable Audio Messaging
Mobile workers need seamless access to communication and information services on portable devices. However current solutions overwhelm users with intrusive and ambiguous notificat...
Nitin "Nick" Sawhney, Chris Schmandt
IJNSEC
2007
125views more  IJNSEC 2007»
14 years 11 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
CCS
2003
ACM
15 years 5 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 6 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...