Sciweavers

655 search results - page 37 / 131
» A behavioral approach to worm detection
Sort
View
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
15 years 10 months ago
Identifying "best bet" web search results by mining past user behavior
The top web search result is crucial for user satisfaction with the web search experience. We argue that the importance of the relevance at the top position necessitates special h...
Eugene Agichtein, Zijian Zheng
IDEAL
2010
Springer
14 years 7 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
ICSE
2009
IEEE-ACM
15 years 4 months ago
Guided path exploration for regression test generation
Regression test generation aims at generating a test suite that can detect behavioral differences between the original and the modified versions of a program. Regression test gen...
Kunal Taneja, Tao Xie, Nikolai Tillmann, Jonathan ...
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
13 years 5 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson
ACSAC
1998
IEEE
15 years 1 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron