Sciweavers

531 search results - page 44 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
IEEEARES
2008
IEEE
15 years 8 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
ACNS
2009
Springer
113views Cryptology» more  ACNS 2009»
15 years 5 months ago
Fast Packet Classification Using Condition Factorization
Abstract. Rule-based packet classification plays a central role in network intrusion detection systems such as Snort. To enhance performance, these rules are typically compiled int...
Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
MICCAI
2010
Springer
14 years 12 months ago
Guide-Wire Extraction through Perceptual Organization of Local Segments in Fluoroscopic Images
Segmentation of surgical devices in fluoroscopic images and in particular of guide-wires is a valuable element during surgery. In cardiac angioplasty, the problem is particularly ...
Nicolas Honnorat, Régis Vaillant, Nikos Par...
124
Voted
DSN
2009
IEEE
14 years 11 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
SE
2007
15 years 2 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller