Sciweavers

1098 search results - page 53 / 220
» Proactive Intrusion Detection
Sort
View
HOLOMAS
2007
Springer
15 years 4 months ago
Detecting Intrusions in Agent System by Means of Exception Handling
We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents. Securityrelated exceptions are identifie...
Eric Platon, Martin Rehák, Nicolas Sabouret...
IPPS
2007
IEEE
15 years 4 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
IEEEIAS
2008
IEEE
15 years 4 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 3 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
ATAL
2008
Springer
14 years 11 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...