Sciweavers

2236 search results - page 83 / 448
» Intrusion detection techniques and approaches
Sort
View
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 3 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
CCS
2006
ACM
15 years 1 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
BMVC
2001
15 years 10 days ago
A SOM Based Approach to Skin Detection with Application in Real Time Systems
A large body of human image processing techniques use skin detection as a first primitive for subsequent feature extraction. Well established methods of colour modelling, such as...
David A. Brown, Ian Craw, Julian Lewthwaite
ACSAC
2002
IEEE
15 years 2 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti