Sciweavers

800 search results - page 119 / 160
» Intrusion Detection Systeme (IDS)
Sort
View
ICCV
2009
IEEE
15 years 1 months ago
Is a detector only good for detection?
A common design of an object recognition system has two steps, a detection step followed by a foreground withinclass classification step. For example, consider face detection by...
Quan Yuan and Stan Sclaroff
USENIX
1990
13 years 10 months ago
The COPS Security Checker System
In the past several years, there have been a large number of published works that have graphically described a wide variety of security problems particular to Unix. Without fail, ...
Daniel Farmer, Eugene H. Spafford
IAAI
1990
13 years 10 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers
IV
2002
IEEE
114views Visualization» more  IV 2002»
14 years 1 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
EASSS
2001
Springer
14 years 1 months ago
Social Knowledge in Multi-agent Systems
This contribution presents a knowledge-based model of the agents’ mutual awareness (social knowledge) and justifies its role in various classes of applications of the concept of...
Vladimír Marík, Michal Pechoucek, Ol...