A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
This paper analyzes the retrospective stories of a four person team responsible for developing a new computer game for mobile phones. Our theorizing is based on an in-depth, two y...
In this paper, a new approach to Mediterranean Water Eddy border detection is proposed. Kohonen self-organizing maps (SOM) are used as data mining tools to cluster image pixels thr...
This paper presents a discussion of simulation-related issues arising in the study of self-similar network traffic with respect to its effect and control. Selfsimilar traffic has...