Sciweavers

458 search results - page 34 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
14 years 4 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
IAT
2009
IEEE
14 years 2 months ago
Developing a Deterministic Patrolling Strategy for Security Agents
Abstract—Developing autonomous systems that patrol environments for detecting intruders is a topic of increasing relevance in security applications. An important aspect of these ...
Nicola Basilico, Nicola Gatti, Francesco Amigoni
LREC
2008
140views Education» more  LREC 2008»
14 years 12 days ago
Toward Active Learning in Data Selection: Automatic Discovery of Language Features During Elicitation
Data Selection has emerged as a common issue in language technologies. We define Data Selection as the choosing of a subset of training data that is most effective for a given tas...
Jonathan Clark, Robert E. Frederking, Lori S. Levi...
CCS
2006
ACM
14 years 2 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
HSNMC
2004
Springer
106views Multimedia» more  HSNMC 2004»
14 years 4 months ago
Performance Evaluation of a Probabilistic Packet Filter Optimization Algorithm for High-Speed Network Monitoring
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...