Sciweavers

877 search results - page 26 / 176
» Intrusion detection systems as evidence
Sort
View
SECPERU
2006
IEEE
15 years 7 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
COMPSAC
2005
IEEE
15 years 7 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
CORR
2010
Springer
119views Education» more  CORR 2010»
15 years 1 months ago
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems
Julie Greensmith, Uwe Aickelin, Jamie Twycross
ICC
2007
IEEE
354views Communications» more  ICC 2007»
15 years 8 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen