Sciweavers

3785 search results - page 95 / 757
» Immune System Based Intrusion Detection System
Sort
View
IJCIS
2006
123views more  IJCIS 2006»
15 years 4 months ago
Non-Intrusive Monitoring of Service-Based Systems
Abstract. This paper presents a framework for monitoring the compliance of systems composed of webservices with requirements set for them at run-time. This framework assumes system...
George Spanoudakis, Khaled Mahbub
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
15 years 10 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
15 years 11 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
CN
2000
95views more  CN 2000»
15 years 4 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 4 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki