Sciweavers

496 search results - page 45 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 9 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
IPPS
2006
IEEE
14 years 2 months ago
A nonself space approach to network anomaly detection
The paper presents an approach for the anomaly detection problem based on principles of immune systems. Flexibility and efficiency of the anomaly detection system are achieved by ...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
ICCCN
2007
IEEE
14 years 2 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
CHI
2007
ACM
14 years 8 months ago
Modeling and understanding students' off-task behavior in intelligent tutoring systems
We present a machine-learned model that can automatically detect when a student using an intelligent tutoring system is off-task, i.e., engaged in behavior which does not involve ...
Ryan Shaun Joazeiro de Baker
KI
2007
Springer
13 years 7 months ago
Improving the Detection of Unknown Computer Worms Activity Using Active Learning
Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, after t...
Robert Moskovitch, Nir Nissim, Dima Stopel, Clint ...