Sciweavers

1013 search results - page 75 / 203
» Intrusion detection
Sort
View
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
15 years 11 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
IPPS
2006
IEEE
15 years 11 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
EGC
2005
Springer
15 years 11 months ago
Towards a Grid-wide Intrusion Detection System
We describe SANTA-G (Grid-enabled System Area Networks Trace Analysis), an instrument monitoring framework that uses the RGMA (Relational Grid Monitoring Architecture). We describe...
Stuart Kenny, Brian A. Coghlan
ICARIS
2004
Springer
15 years 10 months ago
Immune System Approaches to Intrusion Detection - A Review
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of ...
Uwe Aickelin, Julie Greensmith, Jamie Twycross
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
15 years 10 months ago
A Linear Genetic Programming Approach to Intrusion Detection
Abstract. Page-based Linear Genetic Programming (GP) is proposed and implemented with two-layer Subset Selection to address a two-class intrusion detection classification problem a...
Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywo...