Sciweavers

117 search results - page 7 / 24
» Identifying Intrusions in Computer Networks with Principal C...
Sort
View
ACII
2011
Springer
12 years 10 months ago
Investigating the Prosody and Voice Quality of Social Signals in Scenario Meetings
Abstract. In this study we propose a methodology to investigate possible prosody and voice quality correlates of social signals, and test-run it on annotated naturalistic recording...
Marcela Charfuelan, Marc Schröder
ICAC
2009
IEEE
14 years 5 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...
CCS
2007
ACM
14 years 5 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 11 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 3 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw