Sciweavers

3785 search results - page 78 / 757
» Immune System Based Intrusion Detection System
Sort
View
INFOCOM
2006
IEEE
15 years 5 months ago
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
Bradley Stephenson, Biplab Sikdar
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 6 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
RAID
1999
Springer
15 years 4 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
82
Voted
ICARIS
2007
Springer
15 years 6 months ago
On Immune Inspired Homeostasis for Electronic Systems
Many electronic systems would benefit from the inclusion of self-regulatory mechanisms. We strive to build systems that can predict, or be aware of, imminent threats upon their sp...
Nick D. L. Owens, Jonathan Timmis, Andrew J. Green...
SOSP
2005
ACM
15 years 8 months ago
Detecting past and present intrusions through vulnerability-specific predicates
Ashlesha Joshi, Samuel T. King, George W. Dunlap, ...