Sciweavers

3785 search results - page 86 / 757
» Immune System Based Intrusion Detection System
Sort
View
DSN
2005
IEEE
15 years 5 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
RAID
2005
Springer
15 years 5 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
AWIC
2004
Springer
15 years 3 months ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...
DSOM
2007
Springer
15 years 6 months ago
Botnets for Scalable Management
With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets ...
Jérôme François, Radu State, O...
PCM
2004
Springer
106views Multimedia» more  PCM 2004»
15 years 5 months ago
An Immunological Approach to Raising Alarms in Video Surveillance
Inspired by the human immune system, and in particular the negative selection algorithm, we propose a learning mechanism that enables the detection of abnormal activities. Three ty...
Lukman Sasmita, Wanquan Liu, Svetha Venkatesh