×

Found 143 Documents (Results 1–100)

Moving target defense for the placement of intrusion detection systems in the cloud. (English) Zbl 1519.68011

Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 326-345 (2018).
Full Text: DOI

Optimal thresholds for anomaly-based intrusion detection in dynamical environments. (English) Zbl 1453.91032

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 415-434 (2016).
MSC:  91A43 91A80 68M25

Indices of power in optimal IDS default configuration: theory and examples. (English) Zbl 1349.68018

Baras, John S. (ed.) et al., Decision and game theory for security. Second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25279-2/pbk). Lecture Notes in Computer Science 7037, 7-21 (2011).

Network statistics in function of statistical intrusion detection. (English) Zbl 1209.68014

Rudas, Imre J.(ed) et al., Computational intelligence and informatics. Selected papers based on the presentations at the 10th international symposium of Hungarian researchers on computational intelligence and informatics, Budapest, Hungary, November 12–14, 2009. Berlin: Springer (ISBN 978-3-642-15219-1/hbk; 978-3-642-15220-7/ebook). Studies in Computational Intelligence 313, 27-35 (2010).
MSC:  68M10 68M99
Full Text: DOI

A deviation based outlier intrusion detection system. (English) Zbl 1207.68061

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 395-401 (2010).
MSC:  68M10 68T05 68M11
Full Text: DOI

Detection and classification of DDoS attacks using fuzzy inference system. (English) Zbl 1210.68021

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 242-252 (2010).
MSC:  68M10
Full Text: DOI

Fuzzy rule-base based intrusion detection system on application layer. (English) Zbl 1210.68020

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 27-36 (2010).
MSC:  68M10
Full Text: DOI

Novelty-aware attack recognition - intrusion detection with organic computing techniques. (English) Zbl 1202.68081

Hinchey, Mike (ed.) et al., Distributed, parallel and biologically inspired systems. 7th IFIP TC 10 working conference, DIPES 2010, and 3rd IFIP TC 10 international conference biologically-inspired collaborative computing, BICC 2010, held as part of WCC 2010, Brisbane, Australia, September 20–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15233-7/hbk; 978-3-642-15234-4/ebook). IFIP Advances in Information and Communication Technology 329, 242-253 (2010).
MSC:  68M99 68M14
Full Text: DOI

Intrusion detections in collaborative organizations by preserving privacy. (English) Zbl 1198.68086

Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 235-247 (2010).
MSC:  68M10

Neural network and artificial immune systems for malware and network intrusion detection. (English) Zbl 1185.68526

Koronacki, Jacek (ed.) et al., Advances in machine learning II. Dedicated to the memory of Professor Ryszard S. Michalski. Berlin: Springer (ISBN 978-3-642-05178-4/hbk; 978-3-642-05179-1/ebook). Studies in Computational Intelligence 263, 485-513 (2010).
MSC:  68T05 68N99
Full Text: DOI

Multiagent systems for network intrusion detection: A review. (English) Zbl 1191.68727

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 143-154 (2009).
MSC:  68T42 68M10

Learning program behavior for run-time software assurance. (English) Zbl 1191.68483

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 135-142 (2009).
MSC:  68T05 68N99
Full Text: DOI

A competitive neural network for intrusion detection systems. (English) Zbl 1171.68039

Le Thi, Hoai An (ed.) et al., Modelling, computation and optimization in information systems and management sciences. Second international conference MCO 2008, Metz, France - Luxembourg, September 8–10, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-87476-8/pbk). Communications in Computer and Information Science 14, 530-537 (2008).
MSC:  68T05
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software