Sciweavers

935 search results - page 79 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
CSREASAM
2010
13 years 5 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
ISSA
2004
13 years 10 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
NDSS
2007
IEEE
14 years 3 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
BMCBI
2005
90views more  BMCBI 2005»
13 years 9 months ago
Text Detective: a rule-based system for gene annotation in biomedical texts
Background: The identification of mentions of gene or gene products in biomedical texts is a critical step in the development of text mining applications in biosciences. The compl...
Javier Tamames
BIOADIT
2004
Springer
14 years 22 days ago
An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks
Abstract. In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The net...
Jean-Yves Le Boudec, Slavisa Sarafijanovic