Sciweavers

1244 search results - page 89 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
ANCS
2007
ACM
15 years 8 months ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang
RAID
1999
Springer
15 years 8 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
SECURWARE
2008
IEEE
15 years 10 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 4 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
IAT
2006
IEEE
15 years 10 months ago
On the Design of a Web-Based Decision Support System for Brain Tumour Diagnosis Using Distributed Agents
This paper introduces HealthAgents, an EC-funded research project to improve the classification of brain tumours through multi-agent decision support over a distributed network o...
Carles Arús, Bernardo Celda, Srinandan Dasm...