Sciweavers

311 search results - page 15 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
INFFUS
2002
162views more  INFFUS 2002»
13 years 7 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
CAV
2005
Springer
139views Hardware» more  CAV 2005»
14 years 1 months ago
The Orchids Intrusion Detection Tool
ORCHIDS is an intrusion detection tool based on techniques for fast, on-line model-checking. Temporal formulae are taken from a temporal logic tailored to the description of intrus...
Julien Olivain, Jean Goubault-Larrecq
IJDSN
2006
136views more  IJDSN 2006»
13 years 7 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 10 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 1 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen