Sciweavers

2236 search results - page 131 / 448
» Intrusion detection techniques and approaches
Sort
View
CORR
2011
Springer
184views Education» more  CORR 2011»
14 years 1 months ago
Decision-Feedback Differential Detection in Impulse-Radio Ultra-Wideband Systems
—Building upon recent approaches for detection of impulse-radio ultra-wideband (IR-UWB) based on compressed sensing (CS), we combine this approach with techniques known from adva...
Andreas Schenk, Robert F. H. Fischer
RAID
2007
Springer
15 years 4 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
98
Voted
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
15 years 10 months ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 4 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
15 years 3 months ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel