Sciweavers

877 search results - page 65 / 176
» Intrusion detection systems as evidence
Sort
View
53
Voted
ICEIS
2005
IEEE
15 years 7 months ago
Improved Off-Line Intrusion Detection Using a Genetic Algorithm
Pedro A. Diaz-Gomez, Dean F. Hougen
71
Voted
ICEIS
2003
IEEE
15 years 7 months ago
Intrusion Detection Based on Data Mining
Xuan Dau Hoang, Jiankun Hu, Peter Bertók
113
Voted
TIFS
2008
142views more  TIFS 2008»
15 years 1 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
157
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 8 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
WEBI
2009
Springer
15 years 8 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li