Sciweavers

2269 search results - page 289 / 454
» Behavioral Intrusion Detection
Sort
View
IVS
2008
79views more  IVS 2008»
15 years 5 months ago
Scalable and interactive visual analysis of financial wire transactions for fraud detection
Large financial institutions such as Bank of America handle hundreds of thousands of wire transactions per day. Although most transactions are legitimate, these institutions have ...
Remco Chang, Alvin Lee, Mohammad Ghoniem, Robert K...
JSAC
2006
165views more  JSAC 2006»
15 years 5 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
15 years 3 months ago
Detecting anomalies in unmanned vehicles using the Mahalanobis distance
The use of unmanned autonomous vehicles is becoming more and more significant in recent years. The fact that the vehicles are unmanned (whether autonomous or not), can lead to gre...
Raz Lin, Eliahu Khalastchi, Gal A. Kaminka
INFOCOM
2010
IEEE
15 years 3 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
15 years 3 months ago
Detecting Novel Discrepancies in Communication Networks
Abstract--We address the problem of detecting characteristic patterns in communication networks. We introduce a scalable approach based on set-system discrepancy. By implicitly lab...
James Abello, Tina Eliassi-Rad, Nishchal Devanur