Sciweavers

421 search results - page 23 / 85
» SCIDS: A Soft Computing Intrusion Detection System
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 2 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 4 months ago
On Generating Soft Outputs for Lattice-Reduction-Aided MIMO Detection
— Lattice Reduction (LR) aided MIMO detection has been shown to provide near-optimal hard outputs. However soft outputs are required in practical systems to fully exploit gains f...
Vishakan Ponnampalam, Darren McNamara, Andy Lillie...
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
14 years 3 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 10 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
EUROPAR
2006
Springer
14 years 1 months ago
Supporting a Real-Time Distributed Intrusion Detection Application on GATES
Increasingly, a number of applications across computer sciences and other science and engineering disciplines rely on, or can potentially benefit from, analysis and monitoring of d...
Qian Zhu, Liang Chen, Gagan Agrawal