Sciweavers

2236 search results - page 70 / 448
» Intrusion detection techniques and approaches
Sort
View
GPC
2009
Springer
14 years 7 months ago
Integrity Assurance Technique Using Determinant Approach
Data integrity is an important aspect of storage security and reliability which are prerequisite for most computer systems and network applications. This paper proposes a new tech...
Jasim A. Ghaeb
CEEMAS
2007
Springer
15 years 4 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
PVLDB
2010
172views more  PVLDB 2010»
14 years 8 months ago
Database-support for Continuous Prediction Queries over Streaming Data
Prediction is emerging as an essential ingredient for real-time monitoring, planning and decision support applications such as intrusion detection, e-commerce pricing and automate...
Mert Akdere, Ugur Çetintemel, Eli Upfal
CLEF
2011
Springer
13 years 9 months ago
Approaches for Intrinsic and External Plagiarism Detection - Notebook for PAN at CLEF 2011
Plagiarism detection has been considered as a classification problem which can be approximated with intrinsic strategies, considering self-based information from a given document,...
Gabriel Oberreuter, Gaston L'Huillier, Sebasti&aac...
SIGCOMM
2006
ACM
15 years 3 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...