Sciweavers

912 search results - page 79 / 183
» Anomaly
Sort
View
ACSAC
2004
IEEE
14 years 19 days ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
SIGMOD
1995
ACM
126views Database» more  SIGMOD 1995»
14 years 12 days ago
View Maintenance in a Warehousing Environment
A warehouse is a repository of integrated information drawn from remote data sources. Since a warehouse e ectively implements materialized views, we must maintain the views as the...
Yue Zhuge, Hector Garcia-Molina, Joachim Hammer, J...
ATAL
2008
Springer
13 years 11 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ATAL
2008
Springer
13 years 11 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CONEXT
2008
ACM
13 years 10 months ago
Instability free routing: beyond one protocol instance
Today, a large body of research exists regarding the correctness of routing protocols. However, many reported global disruptions of Internet connectivity, e.g., inter-AS persisten...
Franck Le, Geoffrey G. Xie, Hui Zhang