Sciweavers

1013 search results - page 128 / 203
» Storage-Based Intrusion Detection
Sort
View
149
Voted
ICCCN
2007
IEEE
15 years 9 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
CSREASAM
2003
15 years 4 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen
BMEI
2008
IEEE
15 years 10 months ago
Performance Evaluation and Fusion of Methods for Early Detection of Alzheimer Disease
The number of people that develop Alzheimer’s Disease (AD) is rapidly rising, while the initial diagnosis and care of AD patients typically falls on non-specialist and still tak...
Brahim Hamadicharef, Cuntai Guan, Emmanuel C. Ifea...
113
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Contribution of Anomalies Detection and Analysis on Traffic Engineering
—In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale and multi-criteria an...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
119
Voted
MADNES
2005
Springer
15 years 9 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis