Sciweavers

1098 search results - page 15 / 220
» Proactive Intrusion Detection
Sort
View
SICHERHEIT
2008
13 years 11 months ago
Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort
: Die Wirksamkeit von Intrusion Detection Systemen mit Signaturanalyse h
Sebastian Schmerl, René Rietz, Hartmut K&ou...
WEBI
2005
Springer
14 years 3 months ago
Network-Based Intrusion Detection Using Adaboost Algorithm
Intrusion detection on the internet is a heated research field in computer science, where much work has been done during the past two decades. In this paper, we build a network-b...
Wei Hu, Weiming Hu
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
14 years 11 months ago
Data Mining for Intrusion Detection: Techniques, Applications and Systems
Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Ven...
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
14 years 10 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
FPL
2004
Springer
141views Hardware» more  FPL 2004»
14 years 3 months ago
Automatic Synthesis of Efficient Intrusion Detection Systems on FPGAs
—This paper presents a methodology and a tool for automatic synthesis of highly efficient intrusion detection systems using a high-level, graph-based partitioning methodology and...
Zachary K. Baker, Viktor K. Prasanna