Sciweavers

531 search results - page 55 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
CRITIS
2009
15 years 2 months ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
SAC
2010
ACM
15 years 8 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
ICIP
2009
IEEE
14 years 11 months ago
Optimization on active learning strategy for object category retrieval
Active learning is a framework that has attracted a lot of research interest in the content-based image retrieval (CBIR) in recent years. To be effective, an active learning syste...
David Gorisse, Matthieu Cord, Frédér...
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 1 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 7 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao