Sciweavers

420 search results - page 46 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 6 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
AAAI
2000
15 years 1 months ago
An Expert System for Recognition of Facial Actions and their Intensity
The Facial Action Coding System (FACS) is an objective method for quantifying facial movement in terms of 44 component actions, i.e. Action Units (AUs). This system is widely used...
Maja Pantic, Léon J. M. Rothkrantz
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 12 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 6 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
SAC
2010
ACM
15 years 6 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...