Sciweavers

323 search results - page 46 / 65
» Alert Detection in System Logs
Sort
View
118
Voted
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 6 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
SIGMOD
2003
ACM
196views Database» more  SIGMOD 2003»
16 years 22 days ago
Aurora: A Data Stream Management System
The Aurora system [1] is an experimental data stream management system with a fully functional prototype. It includes both a graphical development environment, and a runtime syste...
Daniel J. Abadi, Donald Carney, Ugur Çetint...
106
Voted
CONEXT
2007
ACM
15 years 2 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
87
Voted
WWW
2009
ACM
16 years 1 months ago
Rare item detection in e-commerce site
As the largest online marketplace in the world, eBay has a huge inventory where there are plenty of great rare items with potentially large, even rapturous buyers. These items are...
Dan Shen, Xiaoyuan Wu, Alvaro Bolivar
111
Voted
ICRA
2009
IEEE
141views Robotics» more  ICRA 2009»
15 years 7 months ago
Detecting repeated motion patterns via Dynamic Programming using motion density
— In this paper, we propose a method that detects repeated motion patterns in a long motion sequence efficiently. Repeated motion patterns are the structured information that ca...
Koichi Ogawara, Yasufumi Tanabe, Ryo Kurazume, Tsu...