Sciweavers

3785 search results - page 127 / 757
» Immune System Based Intrusion Detection System
Sort
View
ANCS
2009
ACM
15 years 2 months ago
OASis: towards extensible open-architecture services platforms
In this paper, we propose an extensible Open-Architecture Services platform (OASis) for high-performance network processing. OASis embraces recent advances of open technologies, i...
Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo ...
IWCMC
2010
ACM
15 years 9 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
RAID
1999
Springer
15 years 8 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
KES
2007
Springer
15 years 4 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho
146
Voted
SAFECOMP
1999
Springer
15 years 8 months ago
FlexFi: A Flexible Fault Injection Environment for Microprocessor-Based Systems
Microprocessor-based systems are increasingly used to control safety-critical systems (e.g., air and railway traffic control, nuclear plant control, aircraft and car control). In t...
Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza R...