Sciweavers

2874 search results - page 49 / 575
» Intrusion Detection: Systems and Models
Sort
View
COMPSAC
2005
IEEE
14 years 3 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 10 months ago
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems
Julie Greensmith, Uwe Aickelin, Jamie Twycross
TPDS
2010
113views more  TPDS 2010»
13 years 4 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 4 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen