Sciweavers

420 search results - page 35 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
TASLP
2011
14 years 6 months ago
Tempo Detection Using a Hybrid Multiband Approach
—In this paper, a novel tempo detection system is presented, which suggests the use of a hybrid multiband decomposition. The model tracks the periodicities of different signal pr...
Mikel Gainza, Eugene Coyle
ISI
2008
Springer
14 years 11 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
ACSAC
2008
IEEE
15 years 6 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
TITB
2010
120views Education» more  TITB 2010»
14 years 6 months ago
A distributed, collaborative intelligent agent system approach for proactive postmarketing drug safety surveillance
Discovering unknown adverse drug reactions (ADRs) in postmarketing surveillance as early as possible is of great importance. The current approach to postmarketing surveillance prim...
Yanqing Ji, Hao Ying, Margo S. Farber, John Yen, P...
RAID
1999
Springer
15 years 4 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo