Sciweavers

323 search results - page 23 / 65
» Alert Detection in System Logs
Sort
View
ICMB
2006
IEEE
101views Business» more  ICMB 2006»
14 years 2 months ago
Personal Heart Monitoring and Rehabilitation System using Smart Phones
This paper discusses a personalized heart monitoring system using smart phones and wireless (bio) sensors. We combine ubiquitous computing with mobile health technology to monitor...
Peter Leijdekkers, Valérie Gay
NIPS
1997
13 years 9 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 8 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
WWW
2007
ACM
14 years 9 months ago
Sliding window technique for the web log analysis
The results of the Web query log analysis may be significantly shifted depending on the fraction of agents (non-human clients), which are not excluded from the log. To detect and ...
Nikolai Buzikashvili
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 2 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...