Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,849,687 papers from all fields of science
Search
Sign In
Create Free Account
Misuse detection
Misuse detection actively works against potential insider threats to vulnerable computer data.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Anomaly detection
Attack (computing)
Insider threat
Intrusion detection system
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Classification , Clustering And Intrusion Detection System
Manish Joshi
2012
Corpus ID: 9815389
Cluster analysis or clustering is the task of assigning a set of objects into groups (called clusters) so that the objects in the…
Expand
2012
2012
Detection of intrusion using evolutionary soft computing techniques
A. Arya
,
A. Yadav
,
S. Kumar
2nd IEEE International Conference on Parallel…
2012
Corpus ID: 14068229
An intrusion detection system has the ability to detect known as well as unknown attacks. Conventionally, IDS uses association…
Expand
2009
2009
Intrusion detection with evolutionary learning classifier systems
Kamran Shafi
,
T. Kovacs
,
H. Abbass
,
Weiping Zhu
Natural Computing
2009
Corpus ID: 18159620
Evolutionary Learning Classifier Systems (LCSs) combine reinforcement learning or supervised learning with effective genetics…
Expand
2008
2008
A Behavior Based Approach to Host-Level Intrusion Detection Using Self-Organizing Maps
P. Sujatha
,
A. Kannan
,
S. Ragunath
,
K. S. Bargavi
,
S. Githanjali
First International Conference on Emerging Trends…
2008
Corpus ID: 1776767
Neural networks play a vital role in contemporary intrusion detection systems. This paper presents a framework for anomaly based…
Expand
2008
2008
Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm
Do-hyeon Lee
,
Doo-young Kim
,
Jae-il Jung
International Conferences on Information Science…
2008
Corpus ID: 15512008
Intrusion detection systems are the basis of system protection from network attacks. However, intrusions are increasingly taking…
Expand
2006
2006
A Genetic Algorithm Approach for Doing Misuse Detection in Audit Trail Files
P. Diaz-Gomez
,
D.E. Hougen
15th International Conference on Computing
2006
Corpus ID: 8970072
This paper focuses on the development of an intrusion detection system based on genetic algorithms. We present and justify a…
Expand
2005
2005
Framework for Intrusion Detection Inspired by the Immune System
Melanie Middlemiss
2005
Corpus ID: 30017099
The immune system is a complex and distributed system. It provides a multilevel form of defence, capable of identifying and…
Expand
2005
2005
Query length impact on misuse detection in information retrieval systems
Ling Ma
,
Nazli Goharian
ACM Symposium on Applied Computing
2005
Corpus ID: 2612498
Misuse is the abuse of privileges by an authorized user and is the second most common form of computer crime after viruses…
Expand
Review
2004
Review
2004
A Detection-Oriented Classification of Insider IT Misuse
A. H. Phyo
,
S. Furnell
2004
Corpus ID: 15761584
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…
Expand
2001
2001
The Set and Function Approach to Modeling Authorization in Distributed Systems
T. Ryutov
,
Clifford Neuman
Mathematical Methods, Models, and Architectures…
2001
Corpus ID: 8863174
We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE