Sciweavers

KDD
2003
ACM
127views Data Mining» more  KDD 2003»
15 years 21 days ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
15 years 21 days ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
ICML
2002
IEEE
15 years 1 months ago
Learning to Share Distributed Probabilistic Beliefs
In this paper, we present a general machine learning approach to the problem of deciding when to share probabilistic beliefs between agents for distributed monitoring. Our approac...
Christopher Leckie, Kotagiri Ramamohanarao