Sciweavers

677 search results - page 85 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
13 years 12 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ICICS
2003
Springer
14 years 1 months ago
A Compound Intrusion Detection Model
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfe...
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 2 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
ISMIS
2009
Springer
14 years 2 months ago
Novelty Detection from Evolving Complex Data Streams with Time Windows
Abstract. Novelty detection in data stream mining denotes the identification of new or unknown situations in a stream of data elements flowing continuously in at rapid rate. This...
Michelangelo Ceci, Annalisa Appice, Corrado Loglis...
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
14 years 1 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli