Sciweavers

1013 search results - page 110 / 203
» Storage-Based Intrusion Detection
Sort
View
93
Voted
JISE
2010
107views more  JISE 2010»
14 years 10 months ago
Feature Construction Scheme for Efficient Intrusion Detection System
Eunhye Kim, Seungmin Lee, Ki Hoon Kwon, Sehun Kim
112
Voted
TSMC
2010
14 years 10 months ago
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
Mahbod Tavallaee, Natalia Stakhanova, Ali A. Ghorb...
161
Voted
CASES
2005
ACM
15 years 5 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
110
Voted
ATS
2002
IEEE
94views Hardware» more  ATS 2002»
15 years 8 months ago
Non-Intrusive Design of Concurrently Self-Testable FSMs
We propose a methodology for non-intrusive design of concurrently self-testable FSMs. Unlike duplication schemes, wherein a replica of the original FSM acts as a predictor-compara...
Petros Drineas, Yiorgos Makris
114
Voted
IDEAL
2005
Springer
15 years 9 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...