Sciweavers

421 search results - page 68 / 85
» SCIDS: A Soft Computing Intrusion Detection System
Sort
View
ICNC
2005
Springer
15 years 3 months ago
An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending
In this paper, we review a visual approach and propose it for analysing computer-network activity, which is based on the use of unsupervised connectionist neural network models and...
Álvaro Herrero, Emilio Corchado, José...
SAC
2009
ACM
15 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 2 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
ISSA
2004
14 years 11 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
TVLSI
2010
14 years 4 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi