Sciweavers

49 search results - page 7 / 10
» Intrusion detection mechanisms for VoIP applications
Sort
View
RAID
2005
Springer
15 years 3 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
ACSAC
1998
IEEE
15 years 2 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
15 years 3 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña
EASSS
2001
Springer
15 years 2 months ago
Social Knowledge in Multi-agent Systems
This contribution presents a knowledge-based model of the agents’ mutual awareness (social knowledge) and justifies its role in various classes of applications of the concept of...
Vladimír Marík, Michal Pechoucek, Ol...
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 10 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin