Sciweavers

1997 search results - page 42 / 400
» A Model for Data Leakage Detection
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 6 days ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
NIPS
2008
15 years 1 months ago
Probabilistic detection of short events, with application to critical care monitoring
We describe an application of probabilistic modeling and inference technology to the problem of analyzing sensor data in the setting of an intensive care unit (ICU). In particular...
Norm Aleks, Stuart Russell, Michael G. Madden, Dia...
TVLSI
2008
139views more  TVLSI 2008»
14 years 11 months ago
Ternary CAM Power and Delay Model: Extensions and Uses
Applications in computer networks often require high throughput access to large data structures for lookup and classification. While advanced algorithms exist to speed these search...
Banit Agrawal, Timothy Sherwood
RAID
2005
Springer
15 years 5 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
FIMH
2009
Springer
15 years 6 months ago
Extraction of Coronary Vascular Tree and Myocardial Perfusion Data from Stacks of Cryomicrotome Images
Computational models of myocardial perfusion in normal as well as pathological conditions have contributed to recent advances in the personalized diagnosis and treatment of cardiov...
Pepijn van Horssen, Jeroen P. H. M. van den Wijnga...