Sciweavers

54 search results - page 8 / 11
» Toward Cost-Sensitive Modeling for Intrusion Detection and R...
Sort
View
ACSAC
2005
IEEE
15 years 4 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 5 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
BMCV
2000
Springer
15 years 2 months ago
Towards a Computational Model for Object Recognition in IT Cortex
First IEEE International Workshop on Biologically Motivated Computer Vision, Seoul, Korea (May 2000). There is considerable evidence that object recognition in primates is based o...
David G. Lowe
ANCS
2009
ACM
14 years 8 months ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
SUTC
2006
IEEE
15 years 4 months ago
Detecting the Direction of Motion in a Binary Sensor Network
We examine the problem of detecting the direction of motion in a binary sensor network; in such a network each sensor’s value is supplied reliably in a single bit of information...
Panagiotis Karras, Nikos Mamoulis