Sciweavers

420 search results - page 20 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
ITS
2004
Springer
165views Multimedia» more  ITS 2004»
15 years 2 months ago
Knowledge Representation Requirements for Intelligent Tutoring Systems
In this paper, we make a first effort to define requirements for knowledge representation (KR) in an ITS. The requirements concern all stages of an ITS’s life cycle (construction...
Ioannis Hatzilygeroudis, Jim Prentzas
JCP
2006
173views more  JCP 2006»
14 years 9 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
SEC
1996
14 years 10 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
CEEMAS
2007
Springer
15 years 3 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
IEEEARES
2010
IEEE
14 years 11 months ago
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
—One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore t...
Jorge Blasco Alís, Agustín Orfila, A...