Sciweavers

776 search results - page 37 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
98
Voted
NDSS
2005
IEEE
15 years 7 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...
DSN
2008
IEEE
15 years 8 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
IMC
2009
ACM
15 years 8 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ICPR
2010
IEEE
15 years 5 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
ICIP
2001
IEEE
16 years 3 months ago
Combining support vector machines for accurate face detection
The paper proposes the application of majority voting on the output of several support vector machines in order to select the most suitable learning machine for frontal face detec...
Ioan Buciu, Constantine Kotropoulos, Ioannis Pitas