Sciweavers

5435 search results - page 152 / 1087
» Informed Detection Revisited
Sort
View
124
Voted
IWIA
2006
IEEE
15 years 10 months ago
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organi...
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, ...
CAISE
2006
Springer
15 years 8 months ago
Detecting Changes in Ontologies via DAG Comparison
Abstract. Ontologies are shared conceptualizations of a certain domain. As such domains may change, also changes in the ontologies have to be considered, as otherwise there is no w...
Johann Eder, Karl Wiggisser
136
Voted
JSAC
2000
97views more  JSAC 2000»
15 years 4 months ago
A differential detection scheme for transmit diversity
Abstract--We present a transmission scheme for exploiting diversity given by two transmit antennas when neither the transmitter nor the receiver has access to channel state informa...
Vahid Tarokh, Hamid Jafarkhani
WWW
2007
ACM
16 years 5 months ago
Cantina: a content-based approach to detecting phishing web sites
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, ...
Jason I. Hong, Lorrie Faith Cranor, Yue Zhang 0002
WWW
2005
ACM
16 years 5 months ago
Detection of phishing webpages based on visual similarity
An approach to detection of phishing webpages based on visual similarity is proposed, which can be utilized as a part of an enterprise solution for anti-phishing. A legitimate web...
Liu Wenyin, Guanglin Huang, Liu Xiaoyue, Zhang Min...