Sciweavers

1244 search results - page 140 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
JNSM
2008
93views more  JNSM 2008»
15 years 4 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
RAID
2010
Springer
15 years 3 months ago
Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams
Network intrusion detection systems (NIDS) make extensive use of regular expressions as attack signatures. Internally, NIDS represent and operate these signatures using finite au...
Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Sm...
BMCBI
2010
107views more  BMCBI 2010»
15 years 4 months ago
Detection of characteristic sub pathway network for angiogenesis based on the comprehensive pathway network
Background: Pathways in biological system often cooperate with each other to function. Changes of interactions among pathways tightly associate with alterations in the properties ...
Yezhou Huang, Shao Li
136
Voted
FTDCS
2004
IEEE
15 years 8 months ago
Friendly Object Tracking and Foreign Object Detection and Localization with an SDAC Wireless Sensor Network
This paper presents a proof-of-concept wireless sensor network for detecting and tracking friendly objects and detecting and localizing foreign objects. The network incorporates a...
Douglas Stark, Jesse Davis
IPPS
2005
IEEE
15 years 10 months ago
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
Results of an experimental study of an anomaly detection system based on the paradigm of artificial immune systems (AISs) are presented. Network traffic data are mapped into ant...
Franciszek Seredynski, Pascal Bouvry