Sciweavers

323 search results - page 47 / 65
» Alert Detection in System Logs
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 21 days ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
101
Voted
CVPR
2007
IEEE
16 years 2 months ago
Closed-Loop Tracking and Change Detection in Multi-Activity Sequences
We present a novel framework for tracking of a long sequence of human activities, including the time instances of change from one activity to the next, using a closed-loop, non-li...
Bi Song, Namrata Vaswani, Amit K. Roy Chowdhury
108
Voted
WWW
2006
ACM
16 years 1 months ago
Retroactive answering of search queries
Major search engines currently use the history of a user's actions (e.g., queries, clicks) to personalize search results. In this paper, we present a new personalized service...
Beverly Yang, Glen Jeh
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 21 days ago
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Abstract--We investigate the problem of maintaining an encoded distributed storage system when some nodes contain adversarial errors. Using the error-correction capabilities that a...
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tr...
133
Voted
CAISE
2010
Springer
15 years 1 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song