Sciweavers

496 search results - page 29 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
SE
2007
13 years 9 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
RAID
2000
Springer
13 years 11 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
RAID
2005
Springer
14 years 1 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
RAID
2001
Springer
14 years 10 days ago
Aggregation and Correlation of Intrusion-Detection Alerts
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Hervé Debar, Andreas Wespi
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
14 years 1 months ago
ubiES: An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies
Expert systems are originally designed to generate feasible alternatives in automated manner. The users expect the systems to contribute to make decisions proactively and intellig...
Ohbyung Kwon, Keedong Yoo, Euiho Suh