Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
We describe an application of probabilistic modeling and inference technology to the problem of analyzing sensor data in the setting of an intensive care unit (ICU). In particular...
Norm Aleks, Stuart Russell, Michael G. Madden, Dia...
Applications in computer networks often require high throughput access to large data structures for lookup and classification. While advanced algorithms exist to speed these search...
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
Computational models of myocardial perfusion in normal as well as pathological conditions have contributed to recent advances in the personalized diagnosis and treatment of cardiov...
Pepijn van Horssen, Jeroen P. H. M. van den Wijnga...