Sciweavers

8177 search results - page 124 / 1636
» Detecting System Emulators
Sort
View
SAC
2004
ACM
14 years 3 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
DSN
2000
IEEE
14 years 2 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
ICMI
2007
Springer
161views Biometrics» more  ICMI 2007»
14 years 4 months ago
Detecting communication errors from visual cues during the system's conversational turn
Automatic detection of communication errors in conversational systems has been explored extensively in the speech community. However, most previous studies have used only acoustic...
Sy Bor Wang, David Demirdjian, Trevor Darrell
TSMC
2002
134views more  TSMC 2002»
13 years 10 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
IEEECIT
2010
IEEE
13 years 8 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...