Sciweavers

677 search results - page 61 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
TSMC
2010
14 years 4 months ago
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
Mahbod Tavallaee, Natalia Stakhanova, Ali A. Ghorb...
AAAI
2012
13 years 6 days ago
Learning Behavior Models for Hybrid Timed Systems
A tailored model of a system is the prerequisite for various analysis tasks, such as anomaly detection, fault identification, or quality assurance. This paper deals with the algo...
Oliver Niggemann, Benno Stein, Asmir Vodencarevic,...
EVOW
2009
Springer
15 years 1 months ago
Testing Detector Parameterization Using Evolutionary Exploit Generation
Abstract. The testing of anomaly detectors is considered from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly ...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood, M...
RAID
2007
Springer
15 years 4 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...