Sciweavers

677 search results - page 21 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
ICIAP
2005
ACM
14 years 7 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero
ICANNGA
2009
Springer
201views Algorithms» more  ICANNGA 2009»
14 years 2 months ago
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
SDM
2003
SIAM
124views Data Mining» more  SDM 2003»
13 years 9 months ago
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
Aleksandar Lazarevic, Levent Ertöz, Vipin Kum...
FEGC
2009
94views Biometrics» more  FEGC 2009»
13 years 5 months ago
Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams
Wei Wang 0012, Thomas Guyet, Rene Quiniou, Marie-O...