Sciweavers

655 search results - page 76 / 131
» A behavioral approach to worm detection
Sort
View
ICDM
2007
IEEE
199views Data Mining» more  ICDM 2007»
15 years 4 months ago
Discovering Structural Anomalies in Graph-Based Data
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder
DAIS
2007
14 years 11 months ago
Situation Specification and Realization in Rule-Based Context-Aware Applications
Context-aware applications use and manipulate context information to detect high-level situations, which are used to adapt application behavior. This paper discusses the specificat...
Patricia Dockhorn Costa, João Paulo A. Alme...
ACSAC
2007
IEEE
15 years 4 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 4 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
INFOCOM
2007
IEEE
15 years 4 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos