Sciweavers

152 search results - page 10 / 31
» Measuring intrusion detection capability: an information-the...
Sort
View
TMM
2008
126views more  TMM 2008»
13 years 10 months ago
Extraction of Audio Features Specific to Speech Production for Multimodal Speaker Detection
A method that exploits an information theoretic framework to extract optimized audio features using video information is presented. A simple measure of mutual information (MI) betw...
Patricia Besson, Vlad Popovici, Jean-Marc Vesin, J...
ISI
2008
Springer
13 years 10 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
CCS
2010
ACM
13 years 10 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
ACMSE
2005
ACM
14 years 4 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 8 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...