Sciweavers

776 search results - page 126 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
Identifying High Cardinality Internet Hosts
—The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some examp...
Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhan...
CCS
2007
ACM
15 years 8 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
123
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 2 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 2 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
ESWA
2008
169views more  ESWA 2008»
15 years 1 months ago
Predicting opponent's moves in electronic negotiations using neural networks
Electronic negotiation experiments provide a rich source of information about relationships between the negotiators, their individual actions, and the negotiation dynami...
Réal Carbonneau, Gregory E. Kersten, Rustam...