Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems

CY Ho, YC Lai, IW Chen, FY Wang… - IEEE Communications …, 2012 - ieeexplore.ieee.org
False positives and false negatives happen to every intrusion detection and intrusion
prevention system. This work proposes a mechanism for false positive/negative assessment …

Presence and discernability in conventional and non-photorealistic immersive augmented reality

W Steptoe, S Julier, A Steed - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Non-photorealistic rendering (NPR) has been shown as a powerful way to enhance both
visual coherence and immersion in augmented reality (AR). However, it has only been …

An activity-based defect management framework for product development

H Zheng, W Liu, C Xiao - Computers & Industrial Engineering, 2018 - Elsevier
As competition intensifies, development of complicated hardware products and the decrease
in development cycle lead to increasing design defect risk in hardware products, resulting in …

[PDF][PDF] False positives and negatives from real traffic with intrusion detection/prevention systems

CY Ho, YD Lin, YC Lai, IW Chen, FY Wang… - International Journal of …, 2012 - ijfcc.org
False Positives and Negatives from Real Traffic with Intrusion Detection/Prevention Systems
Page 1 Abstract—False Positives (FPs) and False Negatives (FNs) happen to every Intrusion …

Pcaplib: A system of extracting, classifying, and anonymizing real packet traces

YD Lin, PC Lin, SH Wang, IW Chen… - IEEE Systems …, 2014 - ieeexplore.ieee.org
This paper presents the PCAPLib system for providing extracted, well-classified, and
anonymized packet traces from real network traffic with two mechanisms. First, active trace …

Behavior‐based botnet detection in parallel

K Wang, CY Huang, LY Tsai… - Security and …, 2014 - Wiley Online Library
Botnet has become one major Internet security issue in recent years. Although signature‐
based solutions are accurate, it is not possible to detect bot variants in real‐time. In this …

Structural relationship model for design defect and influencing factors in the concurrent design process

H Zheng, W Liu, C Xiao - International Journal of Production …, 2018 - Taylor & Francis
Concurrent design is a systematic approach that aims to help developers consider all
elements related to the product life cycle, including quality, cost, schedule and user …

Re-examining the performance bottleneck in a NIDS with detailed profiling

PC Lin, JH Lee - Journal of Network and Computer Applications, 2013 - Elsevier
Designing a high-speed network intrusion detection system (NIDS) has attracted much
attention in recent years due to ever-increasing amount of network traffic and ever …

Creditability-based weighted voting for reducing false positives and negatives in intrusion detection

YD Lin, YC Lai, CY Ho, WH Tai - Computers & security, 2013 - Elsevier
False positives (FPs) and false negatives (FNs) happen in every Intrusion Detection System
(IDS). How often they occur is regarded as a measurement of the accuracy of the system …

Stateful traffic replay for web application proxies

CY Huang, YD Lin, PY Liao… - Security and …, 2015 - Wiley Online Library
It is a common practice to test a network device by replaying network traffic onto it and
observe its reactions. Many replay tools support Transmission Control Protocol/Internet …