Sciweavers

531 search results - page 37 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
MSWIM
2005
ACM
15 years 7 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 1 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
ICEIS
2008
IEEE
15 years 8 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
JSW
2007
133views more  JSW 2007»
15 years 1 months ago
New Functions for Unsupervised Asymmetrical Paraphrase Detection
Abstract— Monolingual text-to-text generation is an emerging research area in Natural Language Processing. One reason for the interest in such generation systems is the possibili...
João Cordeiro, Gaël Dias, Pavel Brazdi...
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 7 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel