Sciweavers

171 search results - page 13 / 35
» Privacy intrusion detection using dynamic Bayesian networks
Sort
View
CCS
2007
ACM
15 years 1 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
APNOMS
2008
Springer
14 years 11 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
78
Voted
IWIA
2003
IEEE
15 years 2 months ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
ICPR
2002
IEEE
15 years 10 months ago
Boosting and Structure Learning in Dynamic Bayesian Networks for Audio-Visual Speaker Detection
Bayesian networks are an attractive modeling tool for human sensing, as they combine an intuitive graphical representation with ef?cient algorithms for inference and learning. Ear...
Tanzeem Choudhury, James M. Rehg, Vladimir Pavlovi...