Sciweavers

3785 search results - page 169 / 757
» Immune System Based Intrusion Detection System
Sort
View
144
Voted
AINA
2009
IEEE
15 years 11 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
WIESS
2000
15 years 6 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...
127
Voted
DISCEX
2003
IEEE
15 years 10 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
ACSAC
2002
IEEE
15 years 10 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
WACC
1999
ACM
15 years 9 months ago
SaveMe: a system for archiving electronic documents using messaging groupware
Today, organizations deal with an ever-increasing number of documents that have to be archived because they are either related to their core business (e.g., product designs) or ne...
Stefan Berchtold, Alexandros Biliris, Euthimios Pa...