Sciweavers

877 search results - page 97 / 176
» Intrusion detection systems as evidence
Sort
View
IPPS
2005
IEEE
15 years 7 months ago
A Parallel Algorithm for Correlating Event Streams
This paper describes a parallel algorithm for correlating or “fusing” streams of data from sensors and other sources of information. The algorithm is useful for applications w...
Daniel M. Zimmerman, K. Mani Chandy
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 7 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
ACSAC
2005
IEEE
15 years 7 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
DSN
2009
IEEE
14 years 11 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
SE
2007
15 years 3 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller