Sciweavers

776 search results - page 108 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
INFOVIS
2005
IEEE
15 years 9 months ago
Visual Correlation for Situational Awareness
We present a novel visual correlation paradigm for situational awareness (SA) and suggest its usage in a diverse set of applications that require a high level of SA. Our approach ...
Yarden Livnat, James Agutter, Shaun Moon, Stefano ...
ATC
2009
Springer
15 years 7 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
RAID
2005
Springer
15 years 9 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
AIME
2003
Springer
15 years 9 months ago
Attribute Interactions in Medical Data Analysis
There is much empirical evidence about the success of naive Bayesian classification (NBC) in medical applications of attribute-based machine learning. NBC assumes conditional inde...
Aleks Jakulin, Ivan Bratko, Dragica Smrke, Janez D...
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...