Sciweavers

323 search results - page 45 / 65
» Alert Detection in System Logs
Sort
View
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
FLAIRS
1998
13 years 8 months ago
An Intelligent Debriefing System for Situation Awareness Training
An option to ensure that operators of complex systems have adequate situation awareness (SA) to support decision making and action is to train them to acquire and maintain SA. Thi...
Ellen J. Bass, Samuel T. Ernst-Fortin, Phillip C. ...
SMC
2007
IEEE
130views Control Systems» more  SMC 2007»
14 years 1 months ago
A flow based approach for SSH traffic detection
— The basic objective of this work is to assess the utility of two supervised learning algorithms AdaBoost and RIPPER for classifying SSH traffic from log files without using f...
Riyad Alshammari, A. Nur Zincir-Heywood
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
IEAAIE
2010
Springer
13 years 5 months ago
Web Usage Mining for Improving Students Performance in Learning Management Systems
An innovative technique based on multi-objective grammar guided genetic programming (MOG3P-MI) is proposed to detect the most relevant activities that a student needs to pass a cou...
Amelia Zafra, Sebastián Ventura