Sciweavers

3785 search results - page 132 / 757
» Immune System Based Intrusion Detection System
Sort
View
IV
2002
IEEE
114views Visualization» more  IV 2002»
15 years 9 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
EASSS
2001
Springer
15 years 9 months ago
Social Knowledge in Multi-agent Systems
This contribution presents a knowledge-based model of the agents’ mutual awareness (social knowledge) and justifies its role in various classes of applications of the concept of...
Vladimír Marík, Michal Pechoucek, Ol...
152
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 5 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
140
Voted
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 11 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
AVI
2008
15 years 7 months ago
Browsing a website with topographic hints
This work aimed to propose an adaptive web site in the field of cultural heritage that can dynamically suggest links, based on not intrusive profiling methodologies integrated wit...
Silvia Rossi, A. Inserra, Ernesto Burattini