Sciweavers

682 search results - page 59 / 137
» KIDS - Keyed Intrusion Detection System
Sort
View
129
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
119
Voted
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
15 years 6 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
60
Voted
ICEIS
2005
IEEE
15 years 8 months ago
Improved Off-Line Intrusion Detection Using a Genetic Algorithm
Pedro A. Diaz-Gomez, Dean F. Hougen
76
Voted
ICEIS
2003
IEEE
15 years 7 months ago
Intrusion Detection Based on Data Mining
Xuan Dau Hoang, Jiankun Hu, Peter Bertók
116
Voted
TIFS
2008
142views more  TIFS 2008»
15 years 2 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...