Sciweavers

765 search results - page 53 / 153
» Detecting Anomalies and Intruders
Sort
View
WETICE
2005
IEEE
15 years 3 months ago
Entropy Based Worm and Anomaly Detection in Fast IP Networks
Detecting massive network events like worm outbreaks in fast IP networks, such as Internet backbones, is hard. One problem is that the amount of traffic data does not allow real-t...
Arno Wagner, Bernhard Plattner
RAID
2004
Springer
15 years 3 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
SOCIALCOM
2010
14 years 7 months ago
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and...
Yuhong Liu, Yan (Lindsay) Sun
CVPR
1998
IEEE
15 years 11 months ago
Anomaly Detection through Registration
We study an application of image registration in the medical domain. Based on a 3-D hierarchical deformable registration algorithm, we developed a prototype for automatic register...
Mei Chen, Takeo Kanade, Henry A. Rowley, Dean Pome...
ITCC
2005
IEEE
15 years 3 months ago
Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection
Abstract: Evidence of some attacks can be manifested by abnormal sequences of system calls of programs. Most approaches that have been developed so far mainly concentrate on some p...
Jidong Long, Daniel G. Schwartz, Sara Stoecklin, M...