Sciweavers

1265 search results - page 74 / 253
» Better Burst Detection
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
AIRS
2005
Springer
15 years 3 months ago
The Empirical Impact of the Nature of Novelty Detection
Sentence level novelty detection aims at spotting sentences with novel information from an ordered sentence list. In the task, sentences appearing later in the list with no new me...
Le Zhao, Min Zhang, Shaoping Ma
SAINT
2003
IEEE
15 years 3 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
BICOB
2010
Springer
15 years 2 months ago
Biological Relevance Detection via Network Dynamic Analysis
Most existing approaches for gene selection are based on evaluating the statistical relevance. However, there are remarkable discrepancies between statistical relevance and biolog...
Zheng Zhao, Huan Liu, Jiangxin Wang, Yung Chang
SIGMOD
1996
ACM
84views Database» more  SIGMOD 1996»
15 years 2 months ago
Change Detection in Hierarchically Structured Information
Detecting and representing changes to data is important for active databases, data warehousing, view maintenance, and version and configuration management. Most previous work in c...
Sudarshan S. Chawathe, Anand Rajaraman, Hector Gar...