Sciweavers

800 search results - page 53 / 160
» Intrusion Detection Systeme (IDS)
Sort
View
ICMLA
2003
13 years 10 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
ACSAC
1998
IEEE
14 years 1 months ago
An Architecture for Intrusion Detection Using Autonomous Agents
The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
CSREASAM
2007
13 years 10 months ago
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques
— In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole...
Maitreya Natu, Adarshpal S. Sethi
IEEEMSP
2002
IEEE
134views Multimedia» more  IEEEMSP 2002»
14 years 1 months ago
Beat-ID: identifying music via beat analysis
— Music identification is an effective tool that enables multimedia players to extract a distinct statistical digest of the played content, look up into a music database using t...
Darko Kirovski, Hagai Attias
PTS
2007
120views Hardware» more  PTS 2007»
13 years 10 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König