Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications are Semantic Wikis, Semantic...
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...