Sciweavers

425 search results - page 59 / 85
» Audit
Sort
View
ICCSA
2005
Springer
14 years 1 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
WAIM
2005
Springer
14 years 1 months ago
Integrative Security Management for Web-Based Enterprise Applications
In enterprise environment, security becomes increasingly important and costly. Enterprises are struggling to protect the increasing amount of disparate resources. Simple patchwork ...
Chen Zhao, Yang Chen, Dawei Xu, NuerMaimaiti Heili...
ICCBR
2005
Springer
14 years 1 months ago
Autonomous Internal Control System for Small to Medium Firms
Small to medium enterprises require an internal control mechanism in order to monitor their modus operandi and to analyse whether they are achieving their goals. A tool for the dec...
María Lourdes Borrajo Diz, Juan M. Corchado...
NSPW
2004
ACM
14 years 29 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman