Sciweavers

58 search results - page 7 / 12
» Using Rule-Based Activity Descriptions to Evaluate Intrusion...
Sort
View
JIPS
2007
223views more  JIPS 2007»
14 years 11 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
IMC
2009
ACM
15 years 6 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
IPPS
2010
IEEE
14 years 9 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
JCNS
2006
94views more  JCNS 2006»
14 years 11 months ago
On the application of "equation-free modelling" to neural systems
"Equation-free modelling" is a recently-developed technique for bridging the gap between detailed, microscopic descriptions of systems and macroscopic descriptions of the...
Carlo R. Laing
JOT
2007
193views more  JOT 2007»
14 years 11 months ago
Applying Triple Graph Grammars For Pattern-Based Workflow Model Transformations
Workflow and business process modeling approaches have become essential for designing service collaborations when developing SOA-based systems. To derive actual executable busines...
Carsten Lohmann, Joel Greenyer, Juanjuan Jiang, Ta...