Sciweavers

708 search results - page 66 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 9 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
DSN
2011
IEEE
12 years 8 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
SP
2000
IEEE
14 years 1 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
FGR
2000
IEEE
123views Biometrics» more  FGR 2000»
14 years 1 months ago
A Fast and Accurate Face Detector for Indexation of Face Images
Detecting faces in images with complex backgrounds is a difficult task. Our approach, which obtains state of the art results, is based on a generative neural network model: the C...
Raphaël Feraud, Olivier Bernier, Jean-Emmanue...
TIFS
2008
142views more  TIFS 2008»
13 years 8 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...