Results 281 to 290 of about 212,014 (305)
Some of the next articles are maybe not open access.

Intrusion-Tolerant Intrusion Detection System

2004
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire   +1 more source

Preemptive intrusion detection

Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
This paper presents a system named SPOT to achieve high accuracy and preemptive detection of attacks. We use security logs of real-incidents that occurred over a six-year period at National Center for Supercomputing Applications (NCSA) to evaluate SPOT.
Phuong Cao   +4 more
openaire   +1 more source

Intrusion Detection System

2007
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire   +1 more source

Intrusion detection system

The Journal of the Acoustical Society of America, 1979
A seismic and pressure wave sensor adapted to be buried in the earth to detect disturbances comprises a deformable tube containing an incompressible liquid in which a force-responsive transducer is immersed. The output of the transducer is an alternating signal having spectral components corresponding to both seismic (10-100 Hz) and pressure (< 1 Hz ...
openaire   +1 more source

Intrusion Detection

Network Security, 2000
Eugene Spafford, E Eugene Schultz
openaire   +2 more sources

Intrusion Detection Systems

Computer Fraud & Security, 2001
Abstract In order to answer the opening question, it may help to consider the following scenario. Once upon a time there were isolated villages where everyone trusted everyone else. Little by little, people started to travel from village to village to exchange goods, news and information and life generally got better.
openaire   +1 more source

Intrusion Detection Systems

2005
Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC© while in 1999, there were 9859 reported incidents (CERT/CC©, 2003).
H. Gunes Kayacik   +2 more
openaire   +1 more source

On collaborative intrusion detection

2016
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our society on networked systems aggravates these threats; from interconnected corporate networks and Industrial Control Systems (ICSs) to smart households, the attack surface for the adversaries is increasing.
openaire   +1 more source

Intrusion detection

Computer Networks, 1999
Marc Dacier, Kathleen Jackson
openaire   +1 more source

Home - About - Disclaimer - Privacy