Sciweavers

9503 search results - page 24 / 1901
» Authenticated System Calls
Sort
View
IAW
2003
IEEE
15 years 5 months ago
Detecting Insider Threats by Monitoring System Call Activity
Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenni...
ACSAC
2004
IEEE
15 years 3 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
DIMVA
2009
15 years 24 days ago
Selecting and Improving System Call Models for Anomaly Detection
Alessandro Frossi, Federico Maggi, Gian Luigi Rizz...