Sciweavers

2874 search results - page 42 / 575
» Intrusion Detection: Systems and Models
Sort
View
ACSAC
2001
IEEE
14 years 1 months ago
Implementing the Intrusion Detection Exchange Protocol
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
HOTI
2005
IEEE
14 years 3 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
AISM
2004
13 years 11 months ago
SOHO Wireless Intrusion Detection Systems - Cure or Placebo
Growth of wireless home networking solutions has meant that household computers are now not just connected to the Internet and each other but to passers-by on the street. It is th...
Peter Wolski
TMC
2008
109views more  TMC 2008»
13 years 9 months ago
Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is define...
Yun Wang, Xiaodong Wang, Bin Xie, Demin Wang, Dhar...
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
14 years 3 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...