Sciweavers

1013 search results - page 12 / 203
» Storage-Based Intrusion Detection
Sort
View
IEEEARES
2006
IEEE
15 years 5 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
72
Voted
IWIA
2003
IEEE
15 years 5 months ago
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection
Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn
CIS
2005
Springer
15 years 5 months ago
Computational Intelligence for Network Intrusion Detection: Recent Contributions
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
Asim Karim
IJCNN
2000
IEEE
15 years 4 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
175
Voted
MOBICOM
2000
ACM
15 years 4 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee