Sciweavers

708 search results - page 73 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
14 years 3 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
ICANN
2009
Springer
14 years 22 days ago
Profiling of Mass Spectrometry Data for Ovarian Cancer Detection Using Negative Correlation Learning
This paper proposes a novel Mass Spectrometry data profiling method for ovarian cancer detection based on negative correlation learning (NCL). A modified Smoothed Nonlinear Energy ...
Shan He, Huanhuan Chen, Xiaoli Li, Xin Yao
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 10 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
JSW
2008
98views more  JSW 2008»
13 years 8 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 3 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...