Sciweavers

587 search results - page 11 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
ICDCSW
2005
IEEE
15 years 6 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
113
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 11 days ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
159
Voted
OOPSLA
2000
Springer
15 years 4 months ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg
GCA
2008
15 years 1 months ago
Anomaly Detection and its Application in Grid
- Size and complexity of grid computing systems increase rapidly. Failures can have adverse effect on application executing on the system. Thus, failure information should be provi...
Thuy Nguyen, Thanh Do, Dung Nguyen, Hiep Nguyen, T...
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 11 days ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin