Sciweavers

421 search results - page 69 / 85
» SCIDS: A Soft Computing Intrusion Detection System
Sort
View
CIVR
2009
Springer
253views Image Analysis» more  CIVR 2009»
15 years 4 months ago
Spatial extensions to bag of visual words
The Bag of Visual Words (BoV) paradigm has successfully been applied to image content analysis tasks such as image classification and object detection. The basic BoV approach ove...
Ville Viitaniemi, Jorma Laaksonen
ANSS
2006
IEEE
15 years 3 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
76
Voted
ACMSE
2005
ACM
14 years 11 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin
CNIS
2006
14 years 11 months ago
An efficient hybrid algorithm for multidimensional packet classification
Multidimensional Packet Classification is one of the most critical functions for network security devices such as firewalls and intrusion detection systems. Due to the worst case ...
Yaxuan Qi, Jun Li
RAID
2010
Springer
14 years 8 months ago
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams
Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite au...
Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Sm...