Sciweavers

877 search results - page 109 / 176
» Intrusion detection systems as evidence
Sort
View
DSS
2000
107views more  DSS 2000»
15 years 1 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
114
Voted
AI
2008
Springer
15 years 8 months ago
Using Unsupervised Learning for Network Alert Correlation
Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
Reuben Smith, Nathalie Japkowicz, Maxwell Dondo, P...
232
Voted

Lecture Notes
404views
16 years 12 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
97
Voted
ANLP
2000
118views more  ANLP 2000»
15 years 3 months ago
An Unsupervised Method for Detecting Grammatical Errors
We present an unsupervised method for detecting grammatical errors by inferring negative evidence from edited textual corpora. The system was developed and tested using essay-leng...
Martin Chodorow, Claudia Leacock
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 2 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer