Sciweavers

1244 search results - page 113 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 4 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
ANSS
2006
IEEE
15 years 10 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
CIMCA
2005
IEEE
15 years 10 months ago
Scenario Based Fault Detection in Context-Aware Ubiquitous Systems using Bayesian Networks
We define the use of Bayesian Networks for fault detection in the perception mechanism of context-aware ubiquitous systems. This paper1 describes the complete working of such a f...
Bilal Ahmed, Young-Koo Lee, Sungyoung Lee, Yonil Z...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 11 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
CIT
2004
Springer
15 years 9 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem