144
click to vote
RAID
15 years 8 months ago
2009 Springer
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
137
click to vote
RAID
15 years 8 months ago
2009 Springer
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
112
click to vote
RAID
15 years 8 months ago
2009 Springer
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
RAID
15 years 6 months ago
2009 Springer RAID
15 years 8 months ago
2009 Springer
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
|