Sciweavers

892 search results - page 72 / 179
» Coordinated Scan Detection
Sort
View
ACSAC
2004
IEEE
14 years 1 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
ICDCS
2003
IEEE
14 years 3 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
NDSS
2000
IEEE
14 years 2 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
WACV
2007
IEEE
14 years 4 months ago
Building Adaptive Camera Models for Video Surveillance
We address the limited automatic scanning functionality of standard PTZ camera systems. We present an adaptive, scene-specific model using standard PTZ camera hardware. The adapt...
James W. Davis, Alexander M. Morison, David D. Woo...
FPL
2005
Springer
113views Hardware» more  FPL 2005»
14 years 3 months ago
A Reconfigurable Perfect-Hashing Scheme for Packet Inspection
In this paper, we consider scanning and analyzing packets in order to detect hazardous contents using pattern matching. We introduce a hardware perfect-hashing technique to access...
Ioannis Sourdis, Dionisios N. Pnevmatikatos, Steph...