Sciweavers

655 search results - page 48 / 131
» A behavioral approach to worm detection
Sort
View
SAINT
2003
IEEE
15 years 3 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 1 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
DATE
2004
IEEE
158views Hardware» more  DATE 2004»
15 years 1 months ago
Communication Analysis for System-On-Chip Design
In this paper we present an approach for analysis of systems of parallel, communicating processes for SoC design. We present a method to detect communications that synchronize the...
Axel Siebenborn, Oliver Bringmann, Wolfgang Rosens...
CIKM
2003
Springer
15 years 2 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
LWA
2008
14 years 11 months ago
Towards Burst Detection for Non-Stationary Stream Data
Detecting bursts in data streams is an important and challenging task, especially in stock market, traffic control or sensor network streams. Burst detection means the identificat...
Daniel Klan, Marcel Karnstedt, Christian Pöli...