Sciweavers

440 search results - page 67 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
CCS
2007
ACM
15 years 6 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
ISVC
2007
Springer
15 years 5 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
SISW
2003
IEEE
15 years 5 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 25 days ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
BMCBI
2008
127views more  BMCBI 2008»
14 years 12 months ago
MetaMine - A tool to detect and analyse gene patterns in their environmental context
Background: Modern sequencing technologies allow rapid sequencing and bioinformatic analysis of genomes and metagenomes. With every new sequencing project a vast number of new pro...
Uta Bohnebeck, Thierry Lombardot, Renzo Kottmann, ...