Sciweavers

1424 search results - page 98 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
WWW
2007
ACM
14 years 9 months ago
Netprobe: a fast and scalable system for fraud detection in online auction networks
Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implemen...
Shashank Pandit, Duen Horng Chau, Samuel Wang, Chr...
DSN
2007
IEEE
14 years 2 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
ICPR
2010
IEEE
14 years 16 days ago
Boolean Combination of Classifiers in the ROC Space
Using Boolean AND and OR functions to combine the responses of multiple one- or two-class classifiers in the ROC space may significantly improve performance of a detection system o...
Wael Khreich, Eric Granger, Ali Miri, R. Sabourin
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
13 years 12 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
CODES
2000
IEEE
13 years 11 months ago
On the roles of functions and objects in system specification
We present an analysis of the benefits and drawbacks of function and object based models in system specification. Functional models should be used for functional design space expl...
Axel Jantsch, Ingo Sander