Sciweavers

1098 search results - page 169 / 220
» Proactive Intrusion Detection
Sort
View
IV
2002
IEEE
114views Visualization» more  IV 2002»
15 years 6 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
EASSS
2001
Springer
15 years 6 months ago
Social Knowledge in Multi-agent Systems
This contribution presents a knowledge-based model of the agents’ mutual awareness (social knowledge) and justifies its role in various classes of applications of the concept of...
Vladimír Marík, Michal Pechoucek, Ol...
ICCCN
1998
IEEE
15 years 5 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
ACSAC
2004
IEEE
15 years 5 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
AUSAI
2006
Springer
15 years 5 months ago
DynamicWEB: Profile Correlation Using COBWEB
Establishing relationships within a dataset is one of the core objectives of data mining. In this paper a method of correlating behaviour profiles in a continuous dataset is presen...
Joel Scanlan, Jacky Hartnett, Raymond Williams