Sciweavers

98 search results - page 4 / 20
» Policy-Controlled Event Management for Distributed Intrusion...
Sort
View
DSN
2004
IEEE
13 years 10 months ago
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are bei...
Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Si...
IPSN
2010
Springer
14 years 1 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
14 years 10 days ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
IEEECIT
2010
IEEE
13 years 4 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
DEBS
2007
ACM
13 years 10 months ago
Temporal order optimizations of incremental joins for composite event detection
Queries for composite events typically involve the four complementary dimensions of event data, event composition, relationships between events (esp. temporal and causal), and acc...
François Bry, Michael Eckert