Sciweavers

323 search results - page 11 / 65
» Alert Detection in System Logs
Sort
View
TON
2008
103views more  TON 2008»
13 years 8 months ago
On the race of worms, alerts, and patches
We study the effectiveness of automatic patching and quantify the speed of patch or alert dissemination required for worm containment. We focus on random scanning as this is repres...
Milan Vojnovic, Ayalvadi J. Ganesh
ACSAC
2004
IEEE
14 years 5 days ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 8 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin
ICCHP
2010
Springer
14 years 1 months ago
Real-Time Walk Light Detection with a Mobile Phone
Crossing an urban traffic intersection is one of the most dangerous activities of a blind or visually impaired person's travel. Building on past work by the authors on the iss...
Volodymyr Ivanchenko, James Coughlan, Huiying Shen
ACSAC
2003
IEEE
14 years 1 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...