Sciweavers

3785 search results - page 108 / 757
» Immune System Based Intrusion Detection System
Sort
View
GECCO
2003
Springer
113views Optimization» more  GECCO 2003»
15 years 9 months ago
The Effect of Binary Matching Rules in Negative Selection
Negative selection algorithm is one of the most widely used techniques in the field of artificial immune systems. It is primarily used to detect changes in data/behavior patterns...
Fabio A. González, Dipankar Dasgupta, Jonat...
ISSADS
2005
Springer
15 years 10 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
GLOBECOM
2006
IEEE
15 years 10 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 4 months ago
Optimal Design of a Molecular Recognizer: Molecular Recognition as a Bayesian Signal Detection Problem
Numerous biological functions--such as enzymatic catalysis, the immune response system, and the DNA-protein regulatory network--rely on the ability of molecules to specifically rec...
Yonatan Savir, Tsvi Tlusty
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 8 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes