A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Abstract. To ensure the consistency of database subsystems involved in communication systems (e.g., telephone systems), appropriate scheduled maintenance policies are necessary. Au...
Stefano Porcarelli, Felicita Di Giandomenico, Amin...
Degraded documents are frequently obtained in various situations. Examples of degraded document collections include historical document depositories, document obtained in legal an...