Skip to search formSkip to main contentSkip to account menu

Misuse detection

Misuse detection actively works against potential insider threats to vulnerable computer data.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Cluster analysis or clustering is the task of assigning a set of objects into groups (called clusters) so that the objects in the… 
2012
2012
An intrusion detection system has the ability to detect known as well as unknown attacks. Conventionally, IDS uses association… 
2009
2009
Evolutionary Learning Classifier Systems (LCSs) combine reinforcement learning or supervised learning with effective genetics… 
2008
2008
Neural networks play a vital role in contemporary intrusion detection systems. This paper presents a framework for anomaly based… 
2008
2008
Intrusion detection systems are the basis of system protection from network attacks. However, intrusions are increasingly taking… 
2006
2006
This paper focuses on the development of an intrusion detection system based on genetic algorithms. We present and justify a… 
2005
2005
The immune system is a complex and distributed system. It provides a multilevel form of defence, capable of identifying and… 
2005
2005
Misuse is the abuse of privileges by an authorized user and is the second most common form of computer crime after viruses… 
Review
2004
Review
2004
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is… 
2001
2001
We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling…