Sciweavers

988 search results - page 129 / 198
» Intrusion Detection with Neural Networks
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
CN
2007
90views more  CN 2007»
13 years 8 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
WWW
2009
ACM
14 years 2 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
IJNSEC
2007
171views more  IJNSEC 2007»
13 years 8 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
JCIT
2008
138views more  JCIT 2008»
13 years 8 months ago
Real Time Automated Fabric Defect Detection System using Microcontroller
In a Least Developed Country (LDC) like Bangladesh where the textile is the main core of our economy; still there is a major drawback in this sector which is the defect detection ...
Tamnun E. Mursalin, Fajrana Zebin Eishita, Ahmed R...