Sciweavers

1098 search results - page 140 / 220
» Proactive Intrusion Detection
Sort
View
GLOBECOM
2006
IEEE
15 years 4 months ago
Defending against Instant Messaging Worms
— Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it...
Zhijun Liu, Guoqiang Shu, Na Li, David Lee
IWAN
2004
Springer
15 years 3 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
SE
2007
14 years 11 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
PVLDB
2010
172views more  PVLDB 2010»
14 years 8 months ago
Database-support for Continuous Prediction Queries over Streaming Data
Prediction is emerging as an essential ingredient for real-time monitoring, planning and decision support applications such as intrusion detection, e-commerce pricing and automate...
Mert Akdere, Ugur Çetintemel, Eli Upfal
CCS
2007
ACM
15 years 4 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...