Sciweavers

412 search results - page 3 / 83
» An Empirical Approach to Modeling Uncertainty in Intrusion A...
Sort
View
DATAMINE
2008
143views more  DATAMINE 2008»
13 years 8 months ago
Automatically countering imbalance and its empirical relationship to cost
Learning from imbalanced datasets presents a convoluted problem both from the modeling and cost standpoints. In particular, when a class is of great interest but occurs relatively...
Nitesh V. Chawla, David A. Cieslak, Lawrence O. Ha...
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 10 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
WCRE
2008
IEEE
14 years 3 months ago
A Bayesian Network Based Approach for Change Coupling Prediction
Source code coupling and change history are two important data sources for change coupling analysis. The popularity of public open source projects in recent years makes both sourc...
Yu Zhou, Michael Würsch, Emanuel Giger, Haral...
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 10 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
COMCOM
2002
189views more  COMCOM 2002»
13 years 8 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt