Sciweavers

655 search results - page 32 / 131
» A behavioral approach to worm detection
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 1 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ATAL
2006
Springer
15 years 1 months ago
Automated analysis and verification of agent behavior
Comprehending and analyzing agent behavior is an arduous task due to complexities in agent systems and sophistication of agent behaviors, in addition to the common difficulties wi...
Tibor Bosse, Dung N. Lam, K. Suzanne Barber
KI
2007
Springer
15 years 3 months ago
From Distributed Vision Networks to Human Behavior Interpretation
Abstract. Analysing human behavior is a key step in smart home applications. Many reasoning approaches utilize information of location and posture of the occupant in qualitative as...
Hamid K. Aghajan, Chen Wu
IJISEC
2006
106views more  IJISEC 2006»
14 years 9 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis