Sciweavers

800 search results - page 84 / 160
» Intrusion Detection Systeme (IDS)
Sort
View
SUTC
2006
IEEE
14 years 2 months ago
Native API Based Windows Anomaly Intrusion Detection Method Using SVM
While many researches of Host Anomaly Detection System using system calls under UNIX/UNIX-like systems have been done but little in Windows systems, we do the similar research und...
Miao Wang, Cheng Zhang, Jingjing Yu
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
14 years 1 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
ICEIS
2003
IEEE
14 years 2 months ago
Intrusion Detection Based on Data Mining
Xuan Dau Hoang, Jiankun Hu, Peter Bertók
TIFS
2008
142views more  TIFS 2008»
13 years 8 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...