Sciweavers

457 search results - page 21 / 92
» A Multiple Model Cost-Sensitive Approach for Intrusion Detec...
Sort
View
SAFECOMP
2007
Springer
14 years 26 days ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SECURWARE
2008
IEEE
14 years 1 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
FGR
2000
IEEE
141views Biometrics» more  FGR 2000»
13 years 11 months ago
Multiple Cues used in Model-Based Human Motion Capture
Human motion capture has lately been the object of much attention due to commercial interests. A ”touch free” computer vision solution to the problem is desirable to avoid the...
Thomas B. Moeslund, Erik Granum
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 1 days ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
ACSAC
2008
IEEE
14 years 1 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...