Sciweavers

2269 search results - page 278 / 454
» Behavioral Intrusion Detection
Sort
View
ACMSE
2005
ACM
15 years 10 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha
VLDB
2005
ACM
87views Database» more  VLDB 2005»
15 years 10 months ago
NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems
In this demo, we present Nile-PDT, a Phenomenon Detection and Tracking framework using the Nile data stream management system. A phenomenon is characterized by a group of streams ...
Mohamed H. Ali, Walid G. Aref, Raja Bose, Ahmed K....
ACSAC
2003
IEEE
15 years 10 months ago
Synthesizing Test Data for Fraud Detection Systems
This paper reports an experiment aimed at generating synthetic test data for fraud detection in an IP based videoon-demand service. The data generation verifies a methodology pre...
Emilie Lundin Barse, Håkan Kvarnström, ...
DATE
2000
IEEE
90views Hardware» more  DATE 2000»
15 years 9 months ago
Cost Reduction and Evaluation of a Temporary Faults Detecting Technique
: IC technologies are approaching the ultimate limits of silicon in terms of channel width, power supply and speed. By approaching these limits, circuits are becoming increasingly ...
Lorena Anghel, Michael Nicolaidis
FIW
2007
133views Communications» more  FIW 2007»
15 years 6 months ago
Conflict Detection in Call Control Using First-Order Logic Model Checking
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...