Sciweavers

334 search results - page 14 / 67
» Improving Intrusion Detection Performance using Keyword Sele...
Sort
View
FPL
2005
Springer
137views Hardware» more  FPL 2005»
15 years 9 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk
CCS
2003
ACM
15 years 9 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
154
Voted
ESEM
2007
ACM
15 years 7 months ago
The Effects of Over and Under Sampling on Fault-prone Module Detection
The goal of this paper is to improve the prediction performance of fault-prone module prediction models (fault-proneness models) by employing over/under sampling methods, which ar...
Yasutaka Kamei, Akito Monden, Shinsuke Matsumoto, ...
107
Voted
CCS
2004
ACM
15 years 9 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
IWANN
2001
Springer
15 years 8 months ago
Landmark Recognition for Autonomous Navigation Using Odometric Information and a Network of Perceptrons
In this paper two methods for the detection and recognition of landmarks to be used in topological modeling for autonomous mobile robots are presented. The first method is based o...
Javier de Lope Asiaín, Darío Maraval...