Sciweavers

877 search results - page 88 / 176
» Intrusion detection systems as evidence
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 1 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
CCS
2003
ACM
15 years 7 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 8 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
129
Voted
SPIN
2009
Springer
15 years 8 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
AIED
2009
Springer
15 years 8 months ago
Evidence of Misunderstandings in Tutorial Dialogue and their Impact on Learning
We explore the frequency and impact of misunderstandings in an existing corpus of tutorial dialogues in which a student appears to get an interpretation that is not in line with wh...
Pamela W. Jordan, Diane J. Litman, Michael Lipschu...