A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers

AN Toosi, M Kahani - Computer communications, 2007 - Elsevier
An intrusion detection system's main goal is to classify activities of a system into two major
categories: normal and suspicious (intrusive) activities. Intrusion detection systems usually …

An ontology of information security

A Herzog, N Shahmehri, C Duma - International Journal of …, 2007 - igi-global.com
We present a publicly available, OWL-based ontology of information security which models
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …

Security challenge and defense in VoIP infrastructures

D Butcher, X Li, J Guo - … Systems, Man, and Cybernetics, Part C …, 2007 - ieeexplore.ieee.org
Voice over Internet protocol (VoIP) has become a popular alternative to traditional public-
switched telephone network (PSTN) networks that provides advantages of low cost and …

Network intrusion detection in covariance feature space

S Jin, DS Yeung, X Wang - Pattern Recognition, 2007 - Elsevier
Detecting multiple and various network intrusions is essential to maintain the reliability of
network services. The problem of network intrusion detection can be regarded as a pattern …

[图书][B] Foundations of security: what every programmer needs to know

C Kern, A Kesavan, N Daswani - 2007 - Springer
Dr. Gary McGraw, a well-known software security expert, said,“First things first—make sure
you know how to code, and have been doing so for years. It is better to be a developer (and …

Intrusion detection model based on particle swarm optimization and support vector machine

S Srinoy - … IEEE Symposium on Computational Intelligence in …, 2007 - ieeexplore.ieee.org
Advance in information and communication technologies, force us to keep most of the
information electronically, consequently, the security of information has become a …

[PDF][PDF] Integrated innate and adaptive artificial immune systems applied to process anomaly detection

JP Twycross - 2007 - Citeseer
This thesis explores the design and application of artificial immune systems (AISs), problem-
solving systems inspired by the human and other immune systems. AISs to date have largely …

A knowledge integration framework for complex network management

X Li, C Chandra - Industrial Management & Data Systems, 2007 - emerald.com
Purpose–Large supply and computer networks contain heterogeneous information and
correlation among their components, and are distributed across a large geographical region …

[PDF][PDF] Обнаружение компьютерных атак на основе анализа поведения сетевых объектов: дисс.… канд. физ.-мат. наук: 05.13. 11

ДЮ Гамаюнов - Москва, 2007 - cs.msu.ru
Актуальность темы. Компьютерные сети за несколько последних десятилетий из чисто
технического решения превратились в глобальное явление, развитие которого …

[图书][B] Anomaly detection for HTTP intrusion detection: algorithm comparisons and the effect of generalization on accuracy

KLR Ingham III - 2007 - search.proquest.com
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating.
Therefore security measures to protect vulnerable software is an important part of keeping …