Sciweavers

312 search results - page 25 / 63
» Operational experiences with high-volume network intrusion d...
Sort
View
RAID
1999
Springer
14 years 4 days ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
COMSIS
2007
80views more  COMSIS 2007»
13 years 7 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
ICMCS
2006
IEEE
163views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Methods for None Intrusive Delay Measurment for Audio Communication over Packet Networks
Measurement of the delay is an important and common problem in communication over packet networks. The endto-end and the round trip delay are among the factors directly impacting ...
Mohammad Zad-issa, Norbert Rossello, Laurent Pilat...
CIA
2008
Springer
13 years 10 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
ISI
2008
Springer
13 years 7 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....