Sciweavers

2362 search results - page 83 / 473
» A new approach to edge detection
Sort
View
RAID
2004
Springer
15 years 6 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
IPM
2008
120views more  IPM 2008»
15 years 1 months ago
An information-pattern-based approach to novelty detection
ct 9 In this paper, a new novelty detection approach based on the identification of sentence level information patterns is 10 proposed. First, ``novelty'' is redefined ba...
Xiaoyan Li, W. Bruce Croft
BIOADIT
2004
Springer
15 years 5 months ago
An Artificial Immune System Approach to Misbehavior Detection in Mobile Ad Hoc Networks
Abstract. In mobile ad-hoc networks, nodes act both as terminals and information relays, and participate in a common routing protocol, such as Dynamic Source Routing (DSR). The net...
Jean-Yves Le Boudec, Slavisa Sarafijanovic
DGO
2009
88views Education» more  DGO 2009»
15 years 2 months ago
Attribute-value specification in customs fraud detection: a human-aided approach
With the growing importance of foreign commerce comes also greater opportunities for fraudulent behaviour. As such, governments must try to detect frauds as soon as they take plac...
Norton Trevisan Roman, Cristiano D. Ferreira, Luis...
RE
2002
Springer
15 years 1 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...