Sciweavers

321 search results - page 18 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
ICASSP
2011
IEEE
14 years 3 months ago
A unified approach to real time audio-to-score and audio-to-audio alignment using sequential Montecarlo inference techniques
We present a methodology for the real time alignment of music signals using sequential Montecarlo inference techniques. The alignment problem is formulated as the state tracking o...
Nicola Montecchio, Arshia Cont
95
Voted
INFOCOM
2006
IEEE
15 years 5 months ago
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
Bradley Stephenson, Biplab Sikdar
122
Voted
CORR
2008
Springer
146views Education» more  CORR 2008»
14 years 11 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
GLOBECOM
2006
IEEE
15 years 5 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
CN
2004
129views more  CN 2004»
14 years 11 months ago
Measuring normality in HTTP traffic for anomaly-based intrusion detection
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in t...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...