Sciweavers

128 search results - page 9 / 26
» An Application of Information Theory to Intrusion Detection
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Channel Protection with Real-Time and In-Service Performance Monitoring for Next Generation Secure WDM Networks
Advanced optical networks deploy wavelength division multiplexing technology to transport an unprecedented amount of information per fiber. Each optical channel transports informat...
Stamatios V. Kartalopoulos
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 7 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
SEW
2003
IEEE
14 years 24 days ago
Addressing Software Security and Mitigations in the Life Cycle
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security...
David P. Gilliam, John D. Powell, Eric Haugh, Matt...
CORR
2008
Springer
149views Education» more  CORR 2008»
13 years 7 months ago
Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application
The canonical problem of solving a system of linear equations arises in numerous contexts in information theory, communication theory, and related fields. In this contribution, we...
Ori Shental, Danny Bickson, Paul H. Siegel, Jack K...
IEEECIT
2006
IEEE
14 years 1 months ago
An Energy-Efficient Localization Scheme with Specified Lower Bound for Wireless Sensor Networks
Localization is a basic and critical requirement for wireless sensor network applications, e.g. target tracking, monitoring and intrusion detection. In the received signal strengt...
Haoran Feng, Ruixi Yuan, Chundi Mu