Sciweavers

44 search results - page 5 / 9
» Selecting Appropriate Counter-Measures in an Intrusion Detec...
Sort
View
83
Voted
RAID
1999
Springer
15 years 1 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
JSW
2008
98views more  JSW 2008»
14 years 9 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
15 years 11 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
ANSS
2006
IEEE
15 years 3 months ago
A Simulation and Decision Framework for Selection of Numerical Solvers in
Selecting the right numerical solver or the most appropriate numerical package for a particular simulation problem it is increasingly difficult for users without an extensive math...
Peter Bunus
TISSEC
2008
202views more  TISSEC 2008»
14 years 9 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning