Sciweavers

877 search results - page 10 / 176
» Intrusion detection systems as evidence
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 6 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
IJNSEC
2008
210views more  IJNSEC 2008»
14 years 11 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 24 days ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
FPL
2004
Springer
141views Hardware» more  FPL 2004»
15 years 5 months ago
Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs
—This paper presents a methodology and a tool for automatic synthesis of highly efficient intrusion detection systems using a high-level, graph-based partitioning methodology and...
Zachary K. Baker, Viktor K. Prasanna
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
16 years 1 months ago
Data Mining for Intrusion Detection: Techniques, Applications and Systems
Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Ven...