scholarly journals Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability

2018 ◽  
Vol 10 (04) ◽  
pp. 211-229 ◽  
Author(s):  
Agbotiname L. Imoize ◽  
Taiwo Oyedare ◽  
Michael E. Otuokere ◽  
Sachin Shetty
2014 ◽  
Vol 602-605 ◽  
pp. 1908-1911
Author(s):  
Qing Tian ◽  
Jun Ling Zhu

Based on the data source problems of intrusion detection evaluation and the feature of OpenFlow capable of providing flexible network control, this paper studies the real data evaluation model based on the software-defined network, and makes program implementation over the model-based intrusion detection evaluation system, and then uses the network to simulate this model. The experimental result shows that the model is feasible and effective.


Author(s):  
Richard Lippmann ◽  
Joshua W. Haines ◽  
David J. Fried ◽  
Jonathan Korba ◽  
Kumar Das

2018 ◽  
pp. 131-136
Author(s):  
Keith Lehrer

The book contains a theory of knowledge, self-trust, autonomy, and consciousness. It takes an explanatory system, a theory, to solve philosophical problems, whatever the risk of error. The theory is a coherence theory of knowledge, a defensibility theory of knowledge. The defensibility is an internal capacity supplied by an evaluation system to defend the target claim. Defense or justification that is sustained by truth in the background system is defensible knowledge. Exemplar representation of conscious experience, exemplarization, connects the system with truth by making experience self-representational. The truth-maker and the representation of it are one. The exemplarized experiences also become exhibits of what it is like to experience external entities radiating to represent them. In this way, the accepted premises of our experience, our exemplar representations, become part of the justification and defense of target knowledge claims within our evaluation system.


Sign in / Sign up

Export Citation Format

Share Document