Sciweavers

257 search results - page 16 / 52
» A New Model for Dynamic Intrusion Detection
Sort
View
CDC
2008
IEEE
403views Control Systems» more  CDC 2008»
15 years 6 months ago
A collocation model for water-hammer dynamics with application to leak detection
— This paper presents a new model for so-called water hammer equations based on a collocation method. This model is shown to fairly represent possible leak effects in a pipeline ...
Flor Lizeth Torres Ortiz, Gildas Besancon, Didier ...
111
Voted
CCS
2009
ACM
15 years 6 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
92
Voted
ECCV
2004
Springer
15 years 5 months ago
Novelty Detection in Image Sequences with Dynamic Background
Abstract. We propose a new scheme for novelty detection in image sequences capable of handling non-stationary background scenarious, such as waving trees, rain and snow. Novelty de...
Fredrik Kahl, Richard I. Hartley, Volker Hilsenste...
101
Voted
RAID
2009
Springer
15 years 6 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
15 years 5 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...