In this paper, we present several general policies for deciding when to share probabilistic beliefs between agents for distributed monitoring. In order to evaluate these policies,...
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is ...
A low-effort data mining approach to labeling network event records in a WLAN is proposed. The problem being addressed is often observed in an AI and data mining strategy to netwo...
Taghi M. Khoshgoftaar, Chris Seiffert, Naeem Seliy...
- Data collection mechanism is a crucial factor for the performance of intrusion detection system (IDS). Simple random sampling and Stratified random sampling techniques of statist...
Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexi...
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...