Sciweavers

319 search results - page 45 / 64
» A Compound Intrusion Detection Model
Sort
View
WSC
2007
13 years 9 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
ACSAC
2002
IEEE
14 years 14 days ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
COCOA
2008
Springer
13 years 9 months ago
Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region
Intrusion detection, area coverage and border surveillance are important applications of wireless sensor networks today. They can be (and are being) used to monitor large unprotec...
Binay K. Bhattacharya, B. Burmester, Yuzhuang Hu, ...
GECCO
2003
Springer
147views Optimization» more  GECCO 2003»
14 years 22 days ago
Developing an Immunity to Spam
Immune systems protect animals from pathogens, so why not apply a similar model to protect computers? Several researchers have investigated the use of an artificial immune system ...
Terri Oda, Tony White
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji