Sciweavers

8177 search results - page 69 / 1636
» Detecting System Emulators
Sort
View
ACL
2003
13 years 10 months ago
Optimizing Story Link Detection is not Equivalent to Optimizing New Event Detection
Link detection has been regarded as a core technology for the Topic Detection and Tracking tasks of new event detection. In this paper we formulate story link detection and new ev...
Ayman Farahat, Francine Chen, Thorsten Brants
ISCIS
2004
Springer
14 years 2 months ago
Behavioral Intrusion Detection
Abstract. In this paper we describe anomaly-based intrusion detection as a specialized case of the more general behavior detection problem. We draw concepts from the field of etho...
Stefano Zanero
ESORICS
2012
Springer
11 years 11 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
CISIM
2008
IEEE
14 years 3 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 3 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani