Sciweavers

59 search results - page 9 / 12
» Unrestricted Aggregate Signatures
Sort
View
ISSA
2004
13 years 8 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
ACSAC
2003
IEEE
13 years 10 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
BMCBI
2007
168views more  BMCBI 2007»
13 years 6 months ago
Advancing translational research with the Semantic Web
Background: A fundamental goal of the U.S. National Institute of Health (NIH) "Roadmap" is to strengthen Translational Research, defined as the movement of discoveries i...
Alan Ruttenberg, Tim Clark, William Bug, Matthias ...
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 1 months ago
Quantum Cryptography For Secure Optical Networks
Dense Wavelength Division Multiplexing optical networks transport a huge aggregate traffic exceeding Tbps per single fiber, and passive optical network technology has been extended...
Stamatios V. Kartalopoulos
ACSAC
2005
IEEE
14 years 10 days ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...