Sciweavers

2269 search results - page 162 / 454
» Behavioral Intrusion Detection
Sort
View
IJNSEC
2008
210views more  IJNSEC 2008»
15 years 4 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
155
Voted
IJAIT
2007
180views more  IJAIT 2007»
15 years 4 months ago
Detection and Prediction of Rare Events in Transaction Databases
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...
Christos Berberidis, Ioannis P. Vlahavas
ICDCSW
2005
IEEE
15 years 10 months ago
Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks
∗ In this paper, we propose a transport control performance improvement algorithm in heterogeneous networks. This paper discusses some novel algorithms to estimate the available...
Fang Qi, Weijia Jia, Jie Wu
129
Voted
ICMCS
2010
IEEE
271views Multimedia» more  ICMCS 2010»
15 years 5 months ago
An intelligent high-frame-rate video logging system with real-time image processing at 1000 fps
This paper introduces an intelligent high-frame-rate video logging system that can automatically detect high-speed unpredictable behavior and record video comprising images with d...
Idaku Ishii, Yaodong Wang, Takeshi Takaki
148
Voted
ISMIS
2005
Springer
15 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...