Sciweavers

440 search results - page 50 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
CCS
2007
ACM
14 years 5 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
ACMSE
2006
ACM
14 years 29 days ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
ISMIS
2005
Springer
14 years 4 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
BMCBI
2008
107views more  BMCBI 2008»
13 years 11 months ago
Probe-specific mixed-model approach to detect copy number differences using multiplex ligation-dependent probe amplification (ML
Background: MLPA method is a potentially useful semi-quantitative method to detect copy number alterations in targeted regions. In this paper, we propose a method for the normaliz...
Juan R. González, Josep L. Carrasco, Llu&ia...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 11 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin