Sciweavers

420 search results - page 15 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
DEON
2008
Springer
14 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
EPIA
2003
Springer
15 years 2 months ago
Using CLIPS to Detect Network Intrusions
We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presente...
Pedro Alípio, Paulo Carvalho, José N...
JAIR
2010
181views more  JAIR 2010»
14 years 4 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
TSMC
2002
132views more  TSMC 2002»
14 years 9 months ago
Intelligent agent based framework for manufacturing systems control
Existing modeling frameworks for manufacturing system control can be classified into hierarchical, heterarchical, and hybrid control frameworks. The main drawbacks of existing fram...
Sunderesh S. Heragu, Robert J. Graves, Byung-In Ki...
WOSP
2004
ACM
15 years 2 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...