Sciweavers

319 search results - page 37 / 64
» A Compound Intrusion Detection Model
Sort
View
INTERSPEECH
2010
13 years 2 months ago
Similarity scoring for recognizing repeated out-of-vocabulary words
We develop a similarity measure to detect repeatedly occurring Out-of-Vocabulary words (OOV), since these carry important information. Sub-word sequences in the recognition output...
Mirko Hannemann, Stefan Kombrink, Martin Karafi&aa...
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 25 days ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
ICDCS
2003
IEEE
14 years 25 days ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 7 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan