Sciweavers

670 search results - page 51 / 134
» An Immunological Approach to Change Detection: Theoretical R...
Sort
View
AINA
2008
IEEE
14 years 2 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
GLOBECOM
2006
IEEE
14 years 1 months ago
Blind Multiuser Detection in Multirate CDMA Transmissions Using Fluctuations of Correlation Estimators
Abstract— This paper deals with the problem of blind multiuser detection in multirate direct-sequence code division multiple access (DS-CDMA). Direct-Sequence Spread Spectrum (DS...
C. Nsiala Nzeza, R. Gautier, G. Burel
ACMSE
2005
ACM
14 years 1 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
SCIA
2005
Springer
186views Image Analysis» more  SCIA 2005»
14 years 1 months ago
Building Detection from Mobile Imagery Using Informative SIFT Descriptors
We propose reliable outdoor object detection on mobile phone imagery from off-the-shelf devices. With the goal to provide both robust object detection and reduction of computation...
Gerald Fritz, Christin Seifert, Manish Kumar, Luca...
JSAC
2006
172views more  JSAC 2006»
13 years 7 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu