Sciweavers

496 search results - page 71 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
RAID
2001
Springer
14 years 10 days ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
DEBS
2010
ACM
13 years 12 months ago
Logic-based representation, reasoning and machine learning for event recognition
Today’s organisations require techniques for automated transformation of the large data volumes they collect during their operations into operational knowledge. This requirement...
Alexander Artikis, Georgios Paliouras, Franç...
VIZSEC
2004
Springer
14 years 1 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
GECCO
2005
Springer
163views Optimization» more  GECCO 2005»
14 years 1 months ago
An artificial immune system algorithm for CDMA multiuser detection over multi-path channels
Based on the Antibody Clonal Selection Theory of immunology, we put forward a novel clonal selection algorithm for multiuser detection in Code-division Multiple-access Systems. By...
Maoguo Gong, Ling Wang, Licheng Jiao, Haifeng Du
IEEEARES
2009
IEEE
14 years 2 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop