Sciweavers

201 search results - page 26 / 41
» Active learning for network intrusion detection
Sort
View
IEEEARES
2008
IEEE
14 years 5 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
HAIS
2010
Springer
14 years 3 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
RAID
2005
Springer
14 years 4 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
CN
2010
110views more  CN 2010»
13 years 10 months ago
End-to-end quality of service seen by applications: A statistical learning approach
The focus of this work is on the estimation of quality of service (QoS) parameters seen by an application. Our proposal is based on end-to-end active measurements and statistical ...
Pablo Belzarena, Laura Aspirot
IJCNN
2008
IEEE
14 years 5 months ago
Adaptive curiosity for emotions detection in speech
— Exploratory activities seem to be crucial for our cognitive development. According to psychologists, exploration is an intrinsically rewarding behaviour. The developmental robo...
Alexis Bondu, Vincent Lemaire