Sciweavers

1098 search results - page 176 / 220
» Proactive Intrusion Detection
Sort
View
128
Voted
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
16 years 3 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
153
Voted
LCN
2008
IEEE
15 years 9 months ago
WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks
—Bandwidth estimation techniques seek to provide an accurate estimation of available bandwidth such that network applications can adjust their behavior accordingly. However, most...
Mingzhe Li, Mark Claypool, Robert E. Kinicki
100
Voted
NDSS
2007
IEEE
15 years 9 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
132
Voted
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 8 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
135
Voted
VIZSEC
2005
Springer
15 years 8 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...