Sciweavers

33 search results - page 6 / 7
» Adaptive, Model-Based Monitoring for Cyber Attack Detection
Sort
View
TIFS
2008
142views more  TIFS 2008»
13 years 7 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
DEXA
2010
Springer
266views Database» more  DEXA 2010»
13 years 8 months ago
DBOD-DS: Distance Based Outlier Detection for Data Streams
Data stream is a newly emerging data model for applications like environment monitoring, Web click stream, network traffic monitoring, etc. It consists of an infinite sequence of d...
Md. Shiblee Sadik, Le Gruenwald
WS
2005
ACM
14 years 1 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
AAAI
2008
13 years 10 months ago
Ensemble Forecasting for Disease Outbreak Detection
We describe a method to improve detection of disease outbreaks in pre-diagnostic time series data. The method uses multiple forecasters and learns the linear combination to minimi...
Thomas H. Lotze, Galit Shmueli
CN
2007
224views more  CN 2007»
13 years 7 months ago
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagc...