Sciweavers

2269 search results - page 180 / 454
» Behavioral Intrusion Detection
Sort
View
155
Voted
DASC
2006
IEEE
15 years 8 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
ICPR
2010
IEEE
15 years 2 months ago
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes
Detecting abnormal behaviors in crowd scenes is quite important for public security and has been paid more and more attentions. Most previous methods use offline trained model to p...
Jie Feng, Chao Zhang, Pengwei Hao
HICSS
2008
IEEE
132views Biometrics» more  HICSS 2008»
15 years 11 months ago
Monitoring of Power System Dynamic Behavior Using Characteristic Ellipsoid Method
The potential uses of the sub-second GPSsynchronized phasor data collected from various locations within an electric power system promise endless benefits for the applications tar...
Yuri V. Makarov, Carl H. Miller, Tony B. Nguyen
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
15 years 11 months ago
Mining Periodic Behavior in Dynamic Social Networks
Social interactions that occur regularly typically correspond to significant yet often infrequent and hard to detect interaction patterns. To identify such regular behavior, we p...
Mayank Lahiri, Tanya Y. Berger-Wolf
132
Voted
LCPC
2005
Springer
15 years 10 months ago
Parallelization of Utility Programs Based on Behavior Phase Analysis
Abstract. With the fast development of multi-core processors, automatic parallelization becomes increasingly important. In this work, we focus on the parallelization of utility pro...
Xipeng Shen, Chen Ding