Sciweavers

103 search results - page 12 / 21
» D-SCIDS: Distributed soft computing intrusion detection syst...
Sort
View
IWAN
2004
Springer
14 years 1 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
EC
2000
136views ECommerce» more  EC 2000»
13 years 7 months ago
Architecture for an Artificial Immune System
An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynam...
Steven A. Hofmeyr, Stephanie Forrest
IPPS
2005
IEEE
14 years 1 months ago
A Parallel Algorithm for Correlating Event Streams
This paper describes a parallel algorithm for correlating or “fusing” streams of data from sensors and other sources of information. The algorithm is useful for applications w...
Daniel M. Zimmerman, K. Mani Chandy
SIGCOMM
2009
ACM
14 years 2 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
MOBIHOC
2010
ACM
13 years 5 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang