Sciweavers

440 search results - page 49 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 5 months ago
Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks
—Anomaly detection is an important challenge for tasks such as fault diagnosis and intrusion detection in energy constrained wireless sensor networks. A key problem is how to min...
Sutharshan Rajasegarar, Christopher Leckie, Marimu...
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 5 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 5 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 4 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
COMSNETS
2012
199views more  COMSNETS 2012»
12 years 6 months ago
Varanus: More-with-less fault localization in data centers
Abstract—Detecting and localizing performance faults is crucial for operating large enterprise data centers. This problem is relatively straightforward to solve if each entity (a...
Vaishali P. Sadaphal, Maitreya Natu, Harrick M. Vi...