Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

25 results
Keywords : Intrusion detection
Image document

Towards Creating Believable Decoy Project Folders for Detecting Data Theft

Stefan Thaler , Jerry Den Hartog , Milan Petkovic
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.161-169, ⟨10.1007/978-3-319-41483-6_12⟩
Conference papers hal-01633683v1
Image document

Free Typed Text Using Keystroke Dynamics for Continuous Authentication

Paulo Pinto , Bernardo Patrão , Henrique Santos
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.33-45, ⟨10.1007/978-3-662-44885-4_3⟩
Conference papers hal-01404183v1
Image document

Log File Analysis with Context-Free Grammars

Gregory Bosman , Stefan Gruner
9th International Conference on Digital Forensics (DF), Jan 2013, Orlando, FL, United States. pp.145-152, ⟨10.1007/978-3-642-41148-9_10⟩
Conference papers hal-01460602v1
Image document

A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection

Anurag Das , Samuel A. Ajila , Chung-Horng Lung
2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.40-57, ⟨10.1007/978-3-030-45778-5_4⟩
Conference papers hal-03266472v1
Image document

Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering

Jingping Song , Zhiliang Zhu , Chris Price
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.270-280, ⟨10.1007/978-3-319-10975-6_21⟩
Conference papers hal-01404004v1
Image document

On Copulas-Based Classification Method for Intrusion Detection

Abdelkader Khobzaoui , Mhamed Mesfioui , Abderrahmane Yousfate , Boucif Amar Bensaber
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.394-405, ⟨10.1007/978-3-319-19578-0_32⟩
Conference papers hal-01789951v1
Image document

Implementing a Semantic Approach for Events Correlation in SIEM Systems

Tayeb Kenaza , Abdelkarim Machou , Abdelghani Dekkiche
6th IFIP International Conference on Computational Intelligence and Its Applications (CIIA), May 2018, Oran, Algeria. pp.648-659, ⟨10.1007/978-3-319-89743-1_55⟩
Conference papers hal-01913909v1
Image document

Machine learning methods for anomaly detection in IoT networks, with illustrations

Vassia Bonandrini , Jean-François Bercher , Nawel Zangar
Boumerdassi S., Renault É., Mühlethaler P. (eds), Machine Learning for Networking, Lecture Notes in Computer Science, vol 12081. Springer, pp.287-295, 2020, ⟨10.1007/978-3-030-45778-5_19⟩
Book sections hal-02977813v1
Image document

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

Imen Brahmi , Hanen Brahmi , Sadok Ben Yahia
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.381-393, ⟨10.1007/978-3-319-19578-0_31⟩
Conference papers hal-01789978v1
Image document

Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic

Gustav Šourek , Ondřej Kuželka , Filip Železný
9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.73-86, ⟨10.1007/978-3-319-20034-7_9⟩
Conference papers hal-01410151v1
Image document

Subverting Network Intrusion Detection: Crafting Adversarial Examples Accounting for Domain-Specific Constraints

Martin Teuffenbach , Ewa Piatkowska , Paul Smith
4th International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2020, Dublin, Ireland. pp.301-320, ⟨10.1007/978-3-030-57321-8_17⟩
Conference papers hal-03414751v1
Image document

Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning

Varun Dutt , Young-Suk Ahn , Cleotilde Gonzalez
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.280-292, ⟨10.1007/978-3-642-22348-8_24⟩
Conference papers hal-01586581v1
Image document

Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks

Juliette Dromard , Rida Khatoun , Lyes Khoukhi
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.29-41, ⟨10.1007/978-3-662-43862-6_3⟩
Conference papers hal-01401284v1
Image document

MLP4NIDS: An Efficient MLP-Based Network Intrusion Detection for CICIDS2017 Dataset

Arnaud Rosay , Florent Carlier , Pascal Leroux
2nd International Conference on Machine Learning for Networking (MLN), Dec 2019, Paris, France. pp.240-254, ⟨10.1007/978-3-030-45778-5_16⟩
Conference papers hal-03266466v1
Image document

Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction

Lu Zhao , Ho-Seok Kang , Sung-Ryul Kim
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.490-495, ⟨10.1007/978-3-642-36818-9_55⟩
Conference papers hal-01480208v1
Image document

Machine Learning Approach for IP-Flow Record Anomaly Detection

Cynthia Wagner , Jérôme François , Radu State , Thomas Engel
10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.28-39, ⟨10.1007/978-3-642-20757-0_3⟩
Conference papers inria-00613602v1
Image document

Intrusion Detection in the Smart Grid Based on an Analogue Technique

Hartmut Richthammer , Sebastian Reif
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.56-67, ⟨10.1007/978-3-319-39028-4_5⟩
Conference papers hal-01445793v1
Image document

LDFGB Algorithm for Anomaly Intrusion Detection

Shang-Nan Yin , Zhi-Guo Chen , Sung-Ryul Kim
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.396-404, ⟨10.1007/978-3-642-55032-4_39⟩
Conference papers hal-01397240v1
Image document

A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid

Fang-Yie Leu , Yi-Ting Hsiao , Kangbin Yim , Ilsun You
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.375-385, ⟨10.1007/978-3-642-55032-4_37⟩
Conference papers hal-01397236v1
Image document

Layered Security Architecture for Masquerade Attack Detection

Hamed Saljooghinejad , Wilson Naik Bhukya
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.255-262, ⟨10.1007/978-3-642-31540-4_19⟩
Conference papers hal-01534760v1
Image document

Generating a Real-Time Constraint Engine for Network Protocols

Mohamed Sami Rakha , Fahim T. Imam , Thomas R. Dean
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.44-60, ⟨10.1007/978-3-030-20074-9_5⟩
Conference papers hal-02294615v1
Image document

Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection

Moulay Abdelaziz Elaabid , Khaled Karray , Jean-Luc Danger , Sylvain Guilley
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.109-128, ⟨10.1007/978-3-030-20074-9_9⟩
Conference papers hal-02294610v1
Image document

Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network

Zoltán Czirkos , Gábor Hosszú
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.52-63, ⟨10.1007/978-3-642-32808-4_6⟩
Conference papers hal-01543143v1
Image document

Flow-Based Security Issue Detection in Building Automation and Control Networks

Pavel Čeleda , Radek Krejčí , Vojtěch Krmíček
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.64-75, ⟨10.1007/978-3-642-32808-4_7⟩
Conference papers hal-01543173v1
Image document

A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System

Zhi-Guo Chen , Sung-Ryul Kim
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.386-395, ⟨10.1007/978-3-642-55032-4_38⟩
Conference papers hal-01397238v1