Sciweavers

2236 search results - page 29 / 448
» Intrusion detection techniques and approaches
Sort
View
ECML
2000
Springer
15 years 2 months ago
A Multiple Model Cost-Sensitive Approach for Intrusion Detection
Wei Fan, Wenke Lee, Salvatore J. Stolfo, Matthew M...
CCS
2006
ACM
15 years 1 months ago
Measuring intrusion detection capability: an information-theoretic approach
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
SECRYPT
2007
110views Business» more  SECRYPT 2007»
14 years 11 months ago
Combined Data Mining Approach for Intrusion Detection
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
AINA
2010
IEEE
14 years 8 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...