Sciweavers

463 search results - page 77 / 93
» Using CLIPS to Detect Network Intrusions
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
Steven Noel, Sushil Jajodia
WISTP
2007
Springer
14 years 1 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
CAI
2005
Springer
13 years 7 months ago
Development of Threat Evaluation Tool for Distributed Network Environment
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...
PAMI
2011
12 years 10 months ago
Robust Object Tracking with Online Multiple Instance Learning
In this paper we address the problem of tracking an object in a video given its location in the first frame and no other information. Recently, a class of tracking techniques cal...
Boris Babenko, Ming-Hsuan Yang, Serge Belongie
NETWORKING
2010
13 years 9 months ago
Bidirectional Range Extension for TCAM-Based Packet Classification
Abstract. Packet classification is a fundamental task for network devices such as edge routers, firewalls, and intrusion detection systems. Currently, most vendors use Ternary Cont...
Yan Sun, Min Sik Kim