Sciweavers

877 search results - page 20 / 176
» Intrusion detection systems as evidence
Sort
View
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
136
Voted
ADHOCNETS
2009
Springer
15 years 6 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
ACSAC
2001
IEEE
15 years 5 months ago
Implementing the Intrusion Detection Exchange Protocol
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
HOTI
2005
IEEE
15 years 7 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
AISM
2004
15 years 3 months ago
SOHO Wireless Intrusion Detection Systems - Cure or Placebo
Growth of wireless home networking solutions has meant that household computers are now not just connected to the Internet and each other but to passers-by on the street. It is th...
Peter Wolski