Noureddine Boudriga

Learn More
Anomaly-based intrusion detection is a crucial research issue as it permits to identify attacks that does not necessarily have known signatures. However, approaches using anomalies often consume more resources than those based on misuse detection and have a higher false alarm rate. This paper presents an efficient anomaly analysis method that is proved to(More)
Autonomous multidatabases, Computer Aided Design (CAD) databases, and Object Oriented Databases have requirements that cODstitute a few examples of systems where traditional transactions may not be sufficient. Users of these advanced applications are more sophisticated than users envisioned for On Line Transaction Processing (OLTP) applications a few(More)
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization(More)