Sciweavers

1804 search results - page 114 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
76
Voted
ACSAC
2002
IEEE
15 years 3 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
77
Voted
SISW
2003
IEEE
15 years 3 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
IVC
2002
148views more  IVC 2002»
14 years 9 months ago
Detecting lameness using 'Re-sampling Condensation' and 'multi-stream cyclic hidden Markov models'
A system for the tracking and classification of livestock movements is presented. The combined `tracker-classifier' scheme is based on a variant of Isard and Blakes `Condensa...
Derek R. Magee, Roger D. Boyle
89
Voted
ICIC
2009
Springer
15 years 4 months ago
Ontology-Based Decision Support for Security Management in Heterogeneous Networks
Abstract. In this paper our original methodology of applying ontologybased logic into decision support system for security management in heterogeneous networks is presented. Such d...
Michal Choras, Rafal Kozik, Adam Flizikowski, Rafa...
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 2 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...