Sciweavers

6574 search results - page 55 / 1315
» Current Signatures: Application
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 11 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
ACSAC
2009
IEEE
14 years 2 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
BIOID
2008
110views Biometrics» more  BIOID 2008»
14 years 23 days ago
An Empirical Comparison of Individual Machine Learning Techniques in Signature and Fingerprint Classification
This paper describes an empirical study to investigate the performance of a wide range of classifiers deployed in applications to classify biometric data. The study specifically re...
Marjory C. C. Abreu, Michael C. Fairhurst
TON
2010
139views more  TON 2010»
13 years 5 months ago
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
Abstract--This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applicati...
Aleaandro Finamore, Marco Mellia, Michela Meo, Dar...
EUROPKI
2007
Springer
14 years 5 months ago
E-Passports as a Means Towards the First World-Wide Public Key Infrastructure
Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless communication capability, as well as with a s...
Dimitrios Lekkas, Dimitris Gritzalis