Sciweavers

311 search results - page 50 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
AAAI
2006
13 years 9 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
13 years 8 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
IJCNN
2008
IEEE
14 years 1 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn
IUI
2004
ACM
14 years 29 days ago
Choosing when to interact with learners
In this paper, we describe a method for pedagogical agents to choose when to interact with learners in interactive learning environments. This method is based on observations of h...
Lei Qu, Ning Wang, W. Lewis Johnson
NDSS
2003
IEEE
14 years 25 days ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal