Sciweavers

1098 search results - page 21 / 220
» Proactive Intrusion Detection
Sort
View
JSW
2008
164views more  JSW 2008»
13 years 9 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
ACSAC
1998
IEEE
14 years 2 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
INTERACT
2003
13 years 11 months ago
Be Quiet? Evaluating Proactive and Reactive User Interface Assistants
: This research examined the ability of an anthropomorphic interface assistant to help people learn and use an unfamiliar text-editing tool, with a specific focus on assessing proa...
Jun Xiao, Richard Catrambone, John T. Stasko
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 10 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
IAW
2003
IEEE
14 years 3 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...