Sciweavers

1013 search results - page 29 / 203
» Environment-Sensitive Intrusion Detection
Sort
View
131
Voted
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 3 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
122
Voted
IAW
2003
IEEE
15 years 8 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
113
Voted
IJDSN
2006
136views more  IJDSN 2006»
15 years 2 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
96
Voted
AIMS
2007
Springer
15 years 9 months ago
A Survey of the High-Speed Self-learning Intrusion Detection Research Area
Intrusion detection for IP networks has been a research theme for a number of years already. One of the challenges is to keep up with the ever increasing Internet usage and network...
Anna Sperotto, Remco van de Meent
137
Voted
VIIP
2001
15 years 4 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher