Sciweavers

1013 search results - page 23 / 203
» Intrusion detection
Sort
View
ATAL
2004
Springer
14 years 1 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
PTS
2007
120views Hardware» more  PTS 2007»
13 years 11 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
COMPSAC
2005
IEEE
14 years 3 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 10 months ago
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS ...
S. Sangeetha, V. Vaidehi
ICIP
2002
IEEE
14 years 11 months ago
Robust real-time intrusion detection with fuzzy classification
Giovanni Milanesi, Augusto Sarti, Stefano Tubaro