Sciweavers

496 search results - page 31 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
RAID
1999
Springer
14 years 5 days ago
Intrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can dea...
Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Y...
EUROPAR
2006
Springer
13 years 11 months ago
Supporting a Real-Time Distributed Intrusion Detection Application on GATES
Increasingly, a number of applications across computer sciences and other science and engineering disciplines rely on, or can potentially benefit from, analysis and monitoring of d...
Qian Zhu, Liang Chen, Gagan Agrawal
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 8 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
ANCS
2006
ACM
13 years 11 months ago
Packet pre-filtering for network intrusion detection
As Intrusion Detection Systems (IDS) utilize more complex syntax to efficiently describe complex attacks, their processing requirements increase rapidly. Hardware and, even more, ...
Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N....
ICPR
2008
IEEE
14 years 2 months ago
Intelligence computing approach for seizure detection based on intracranial electroencephalogram (IEEG)
Epilepsy is a neurological disorder which causes two million people in the United States for suffering. In this research, we proposed a seizure detection method based on intracran...
Tsu-Wang Shen, Xavier Kuo, Chung-Shan Yu