Sciweavers

112 search results - page 13 / 23
» Bro: a system for detecting network intruders in real-time
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
TISSEC
2010
119views more  TISSEC 2010»
13 years 2 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
IWINAC
2005
Springer
14 years 1 months ago
MEPIDS: Multi-Expression Programming for Intrusion Detection System
Abstract. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been ...
Crina Grosan, Ajith Abraham, Sang-Yong Han
TELSYS
2010
147views more  TELSYS 2010»
13 years 2 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
ICMCS
2005
IEEE
151views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Face and Eye Rectification in Video Conference Using Artificial Neural Network
The lack of eye contact in video conference degrades the user’s experience. This problem has been known and studied for many years. There are hardware-based solutions to the eye...
Ben Yip