Sciweavers

3785 search results - page 116 / 757
» Immune System Based Intrusion Detection System
Sort
View
DSN
2005
IEEE
15 years 10 months ago
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
Fault-tolerant protocols, asynchronous and synchronous alike, make stationary fault assumptions: only a fraction f of the total n nodes may fail. Whilst a synchronous protocol is ...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
151
Voted
COMCOM
2008
120views more  COMCOM 2008»
15 years 4 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
COMCOM
2008
145views more  COMCOM 2008»
15 years 4 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
WIMOB
2008
IEEE
15 years 11 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ICCS
2007
Springer
15 years 10 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...