Sciweavers

270 search results - page 7 / 54
» Network-Based Intrusion Detection Using Adaboost Algorithm
Sort
View
ITIIS
2010
190views more  ITIIS 2010»
14 years 5 months ago
An Efficient String Matching Algorithm Using Bidirectional and Parallel Processing Structure for Intrusion Detection System
Rapid growth of internet applications has increased the importance of intrusion detection system (IDS) performance. String matching is the most computation-consuming task in IDS. ...
Gwo-Ching Chang, Yue-Der Lin
ADHOCNETS
2009
Springer
15 years 3 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
SEC
2008
15 years 11 days ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero
CSREASAM
2007
15 years 12 days ago
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques
— In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole...
Maitreya Natu, Adarshpal S. Sethi