Sciweavers

2269 search results - page 193 / 454
» Behavioral Intrusion Detection
Sort
View
128
Voted
DIMVA
2007
15 years 6 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
ICSE
2009
IEEE-ACM
15 years 11 months ago
Guided path exploration for regression test generation
Regression test generation aims at generating a test suite that can detect behavioral differences between the original and the modified versions of a program. Regression test gen...
Kunal Taneja, Tao Xie, Nikolai Tillmann, Jonathan ...
PTS
2007
81views Hardware» more  PTS 2007»
15 years 6 months ago
An EFSM-Based Passive Fault Detection Approach
Extended Finite State Machine (EFSM)-based passive fault detection involves modeling the system under test (SUT) as an EFSM M, monitoring the input/output behaviors of the SUT, and...
Hasan Ural, Zhi Xu
BILDMED
2009
130views Algorithms» more  BILDMED 2009»
15 years 6 months ago
Feature Processing for Automatic Anatomical Landmark Detection Using Reservoir Networks
We present an approach to the combination of an arbitrary number of image features to produce more sophisticated features for anatomical landmark detection. The combination was don...
Benjamin Roeschies, Susanne Winter
CCS
2007
ACM
15 years 9 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...