Sciweavers

55 search results - page 3 / 11
» Misuse Detection in Database Systems Through User Profiling
Sort
View
VIZSEC
2004
Springer
13 years 11 months ago
Email archive analysis through graphical visualization
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 6 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
JCS
2002
115views more  JCS 2002»
13 years 5 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
ACSAC
2004
IEEE
13 years 9 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ICDE
2003
IEEE
137views Database» more  ICDE 2003»
13 years 11 months ago
Personalized Portals for the Wireless and Mobile User; a Mobile Agent Approach
The Wireless environment requires new type of services and new ways for structuring the needed content. Personalization comes into aid via the creation of personalized portals tha...
Christoforos Panayiotou, George Samaras