Misuse detection

Results: 20



#Item
11Statistics / Fuzzy logic / Artificial intelligence / Logic in computer science / Science / Anomaly detection / Intrusion detection system / Misuse detection / Association rule learning / Logic / Data security / Data mining

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges, Associate Professor Rayford B. Vaughn, Associate Professor Department of Computer Science

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
12

Reward Scheme YOUR NAME & IDENTITY WILL BE KEPT ABSOLUTELY CONFIDENTIAL The Bureau of Indian Standards has launched an attractive Reward Scheme for informer who provide specific information for detection of Misuse of BI

Add to Reading List

Source URL: bis.org.in

Language: English - Date: 2014-01-09 03:20:48
    13Practice of law / Banking / Financial institutions / Escrow / Interest on Lawyer Trust Accounts / Bank / Cheque / Law / Legal ethics / Non-sufficient funds

    The Dishonored Check Reporting Rule - Year 2001 Update New York’s Dishonored Check Reporting Rule1 has proven to be an effective detection device of the misuse of client funds. The New York Lawyers’ Fund for Client P

    Add to Reading List

    Source URL: www.nylawfund.org

    Language: English - Date: 2009-04-02 07:32:16
    14Computer network security / Data security / Crime prevention / National security / LUARM / Misuse detection / Audit trail / Misuse case / Audit / Computer security / Security / Cyberwarfare

    LUARM – An audit engine for insider misuse detection George Magklaras Steven Furnell and Maria Papadaki Center for Security, Communications and Networks Research, School of Computing and Mathematics, University of Plym

    Add to Reading List

    Source URL: luarm.sourceforge.net

    Language: English - Date: 2011-03-03 18:18:26
    15Software / Computer security / Data security / Intrusion detection system / System administration / AAFID / Anomaly detection / Snort / Misuse detection / Computer network security / Computing / System software

    A Distributed Intrusion Detection Prototype using Security Agents V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, B. Maglaris Network Management & Optimal Design Lab (NETMODE), ECE Department – National Technical

    Add to Reading List

    Source URL: www.netmode.ntua.gr

    Language: English - Date: 2004-05-28 14:14:29
    16Neurochemistry / 3-Fluoromethcathinone / Methylone / Designer drug / Methcathinone / Ethcathinone / Naphyrone / Advisory Council on the Misuse of Drugs / Mephedrone / Cathinones / Chemistry / Organic chemistry

    SIPR Research Summary No: 16 November Year 2013 DETECTION OF MEPHEDRONE AND OTHER ‘LEGAL HIGH’ DRUGS IN BIOLOGICAL FLUIDS Alanna De Korompay BSc (Hons) MSc AMRSC

    Add to Reading List

    Source URL: www.sipr.ac.uk

    Language: English - Date: 2013-11-05 04:49:57
    17Computer network security / Information technology management / Intrusion detection system / Anomaly detection / Wireless intrusion prevention system / Misuse detection / Intrusion detection system evasion techniques / Intrusion prevention system / Data security / Computer security / Security

    ISSN:[removed]Dr Guruprasad Khataniar et al , International Journal of Computer Science & Communication Networks,Vol 2(4), [removed]

    Add to Reading List

    Source URL: ijcscn.com

    Language: English - Date: 2012-08-28 09:07:11
    18Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Local outlier factor / Network performance / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security

    A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection† Aleksandar Lazarevic*, Levent Ertoz*, Vipin Kumar*, Aysel Ozgur*, Jaideep Srivastava* Abstract

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2003-03-21 18:36:29
    19Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Network performance / Local outlier factor / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security

    PDF Document

    Add to Reading List

    Source URL: www.siam.org

    Language: English - Date: 2008-05-13 10:17:41
    20Computer network security / Data analysis / Anomaly detection / Intrusion detection system / Local outlier factor / Network performance / Misuse detection / Robust random early detection / Outlier / Statistics / Data security / Data mining

    PDF Document

    Add to Reading List

    Source URL: www.csee.umbc.edu

    Language: English - Date: 2002-10-29 14:04:58
    UPDATE