Sciweavers

1013 search results - page 84 / 203
» Intrusion detection
Sort
View
ACSAC
1999
IEEE
15 years 9 months ago
Architecture and Concepts of the ARGuE Guard
ARGuE (Advanced Research Guard for Experimentation) is a prototype guard being developed as a basis for experimentation. ARGuE is based on Network Associates' Gauntlet firewa...
Jeremy Epstein
CORR
2010
Springer
178views Education» more  CORR 2010»
15 years 5 months ago
Fast Histograms using Adaptive CUDA Streams
Histograms are widely used in medical imaging, network intrusion detection, packet analysis and other streambased high throughput applications. However, while porting such software...
Sisir Koppaka, Dheevatsa Mudigere, Srihari Narasim...
130
Voted
IDEAL
2005
Springer
15 years 11 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 5 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
CCS
2003
ACM
15 years 10 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson