Sciweavers

421 search results - page 54 / 85
» SCIDS: A Soft Computing Intrusion Detection System
Sort
View
IAAI
1990
14 years 10 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers
81
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 9 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
CCS
2006
ACM
15 years 1 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
EGC
2005
Springer
15 years 3 months ago
A Monitoring Architecture for Control Grids
Abstract. Monitoring systems are nowadays ubiquitous in complex environments, such as Grids. Their use is fundamental for performance evaluation, problem spotting, advanced debuggi...
Alexandru Iosup, Nicolae Tapus, Stéphane Vi...
103
Voted
IPMU
2010
Springer
14 years 8 months ago
Performance Comparison of Fusion Operators in Bimodal Remote Sensing Snow Detection
Abstract. This contribution describes the system developed and implemented for the detection of snow based on the fusion of optical and Synthetic Aperture Radar (SAR) remote sensin...
Aureli Soria-Frisch, Antonio Repucci, Laura Moreno...