Sciweavers

765 search results - page 105 / 153
» Detecting Anomalies and Intruders
Sort
View
TISSEC
2010
119views more  TISSEC 2010»
14 years 6 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
MSWIM
2005
ACM
15 years 5 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
HPCC
2007
Springer
15 years 6 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
ICSE
2009
IEEE-ACM
16 years 21 days ago
Discovering and representing systematic code changes
Software engineers often inspect program differences when reviewing others' code changes, when writing check-in comments, or when determining why a program behaves differentl...
Miryung Kim, David Notkin
SDM
2009
SIAM
124views Data Mining» more  SDM 2009»
15 years 9 months ago
Non-parametric Information-Theoretic Measures of One-Dimensional Distribution Functions from Continuous Time Series.
We study non-parametric measures for the problem of comparing distributions, which arise in anomaly detection for continuous time series. Non-parametric measures take two distribu...
Ali Dasdan, Paolo D'Alberto