Sciweavers

3785 search results - page 57 / 757
» Immune System Based Intrusion Detection System
Sort
View
JSS
2002
198views more  JSS 2002»
14 years 11 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
IEEEIAS
2008
IEEE
15 years 6 months ago
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment
Modern cars offer an increasingly powerful Multimedia environment. While also the potential for an application as Human Computer Interface (HCI) is growing, in this paper we conce...
Tobias Hoppe, Stefan Kiltz, Jana Dittmann
INFOCOM
2000
IEEE
15 years 4 months ago
Transport and Application Protocol Scrubbing
— This paper describes the design and implementation of a protocol scrubber, a transparent interposition mechanism for explicitly removing network attacks at both the transport a...
G. Robert Malan, David Watson, Farnam Jahanian, Pa...
CORR
2010
Springer
150views Education» more  CORR 2010»
14 years 12 months ago
Dendritic Cells for Real-Time Anomaly Detection
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the ystem. The behaviour of human DCs is abstracted to form an algorithm suitable...
Julie Greensmith, Uwe Aickelin