Sciweavers

2269 search results - page 203 / 454
» Behavioral Intrusion Detection
Sort
View
PDPTA
2003
15 years 6 months ago
Misuse Detection for Information Retrieval Systems: A Preliminary Approach
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
ICDM
2006
IEEE
89views Data Mining» more  ICDM 2006»
15 years 11 months ago
Plagiarism Detection in arXiv
We describe a large-scale application of methods for finding plagiarism and self-plagiarism in research document collections. The methods are applied to a collection of 284,834 d...
Daria Sorokina, Johannes Gehrke, Simeon Warner, Pa...
WSC
2007
15 years 7 months ago
A trace-based visual inspection technique to detect errors in simulation models
Generation of traces from a simulation model and their analysis is a powerful and common mean to debug simulation models. In this paper, we define a measure of progress for simul...
Peter Kemper
CCECE
2009
IEEE
15 years 11 months ago
Inverse data transformation for change detection in wind turbine diagnostics
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...
GLOBECOM
2009
IEEE
15 years 11 months ago
Strong Barrier Coverage with Directional Sensors
Abstract—The barrier coverage model was proposed for applications in which sensors are deployed for intrusion detection. In this paper, we study a strong barrier coverage problem...
Li Zhang, Jian Tang, Weiyi Zhang