Sciweavers

1013 search results - page 136 / 203
» Storage-Based Intrusion Detection
Sort
View
112
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 3 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
123
Voted
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
15 years 9 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
IJNSEC
2008
210views more  IJNSEC 2008»
15 years 3 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
146
Voted
IJAIT
2007
180views more  IJAIT 2007»
15 years 3 months ago
Detection and Prediction of Rare Events in Transaction Databases
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...
Christos Berberidis, Ioannis P. Vlahavas
ICDCSW
2005
IEEE
15 years 9 months ago
Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks
∗ In this paper, we propose a transport control performance improvement algorithm in heterogeneous networks. This paper discusses some novel algorithms to estimate the available...
Fang Qi, Weijia Jia, Jie Wu