Sciweavers

1013 search results - page 109 / 203
» Storage-Based Intrusion Detection
Sort
View
125
Voted
TC
2002
15 years 3 months ago
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilber...
137
Voted
ML
2010
ACM
155views Machine Learning» more  ML 2010»
15 years 1 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
87
Voted
CONEXT
2010
ACM
15 years 1 months ago
Network-wide deployment of intrusion detection and prevention systems
Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta...
132
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Robust and Fast Pattern Matching for Intrusion Detection
Kedar S. Namjoshi, Girija J. Narlikar
94
Voted
JISE
2010
90views more  JISE 2010»
14 years 10 months ago
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems
Chang-Ching Yang, Chen-Mou Cheng, Sheng-De Wang