Sciweavers

1503 search results - page 79 / 301
» Detecting Anomalies in Graphs
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
SAC
2004
ACM
15 years 9 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
ICIP
2001
IEEE
16 years 6 months ago
(Automatic) target detection in synthetic aperture radar imagery via terrain recognition
Surveillance of large areas of the Earths surface is often undertaken with low resolution synthetic aperture radar (SAR) imagery from either a satellite or a plane. There is a nee...
Rupert Paget, John Homer, Donald Crisp
CIA
2007
Springer
15 years 10 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...
AWIC
2004
Springer
15 years 8 months ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...