Sciweavers

JMLR
2010
153views more  JMLR 2010»
12 years 12 months ago
Feature Extraction for Outlier Detection in High-Dimensional Spaces
This work addresses the problem of feature extraction for boosting the performance of outlier detectors in high-dimensional spaces. Recent years have observed the prominence of mu...
Nguyen Hoang Vu, Vivekanand Gopalkrishnan
ACSW
2006
13 years 6 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
CCS
2007
ACM
13 years 9 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
IWPC
2008
IEEE
13 years 11 months ago
Scenario-Based Comparison of Clone Detection Techniques
Over the last decade many techniques for software clone detection have been proposed. In this paper, we provide a comprehensive survey of the capabilities of currently available c...
Chanchal Kumar Roy, James R. Cordy
ISSTA
2009
ACM
13 years 11 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore