Sciweavers

433 search results - page 28 / 87
» Hierarchical Visualization of Network Intrusion Detection Da...
Sort
View
ASUNAM
2009
IEEE
14 years 21 days ago
Detecting Structural Changes and Command Hierarchies in Dynamic Social Networks
Community detection in social networks varying with time is a common yet challenging problem whereby efficient visualization of evolving relationships and implicit hierarchical s...
Romain Bourqui, Frédéric Gilbert, Pa...
RAID
2009
Springer
14 years 2 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
TSMC
2002
134views more  TSMC 2002»
13 years 7 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
RAID
2005
Springer
14 years 1 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
ICDCSW
2005
IEEE
14 years 1 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani