Sciweavers

457 search results - page 2 / 92
» A Multiple Model Cost-Sensitive Approach for Intrusion Detec...
Sort
View
IJCV
2011
264views more  IJCV 2011»
13 years 1 months ago
Cost-Sensitive Active Visual Category Learning
Abstract We present an active learning framework that predicts the tradeoff between the effort and information gain associated with a candidate image annotation, thereby ranking un...
Sudheendra Vijayanarasimhan, Kristen Grauman
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 8 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
ACSAC
1998
IEEE
13 years 11 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer
GLOBECOM
2006
IEEE
14 years 20 days ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
JNCA
2007
179views more  JNCA 2007»
13 years 6 months ago
Modeling intrusion detection system using hybrid intelligent systems
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Sandhya Peddabachigari, Ajith Abraham, Crina Grosa...