: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...