136
Voted
RAID
15 years 7 months ago
2009 Springer
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
129
click to vote
RAID
15 years 7 months ago
2009 Springer
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
107
click to vote
RAID
15 years 7 months ago
2009 Springer
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
RAID
15 years 5 months ago
2009 Springer 86
Voted
RAID
15 years 7 months ago
2009 Springer
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
|