Sciweavers

935 search results - page 26 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
14 years 1 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
WSC
1998
13 years 9 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 2 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 9 months ago
Design, Implementation, and Evaluation of a Repairable Database Management System
Although conventional database management systems are designed to tolerate hardware and to a lesser extent even software errors, they cannot protect themselves against syntactical...
Tzi-cker Chiueh, Dhruv Pilania
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 1 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...