Sciweavers

765 search results - page 77 / 153
» Detecting Anomalies and Intruders
Sort
View
EUROMICRO
2004
IEEE
15 years 1 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
ACNS
2003
Springer
129views Cryptology» more  ACNS 2003»
15 years 3 months ago
Using Feedback to Improve Masquerade Detection
Abstract. To gain access to account privileges, an intruder masquerades as the proper account user. Information from user feedback helps to improve the accuracy of classifiers use...
Kwong H. Yung
IJRR
2006
95views more  IJRR 2006»
14 years 9 months ago
Experiments with a Large Heterogeneous Mobile Robot Team: Exploration, Mapping, Deployment and Detection
We describe the design and experimental validation of a large heterogeneous mobile robot team built for the DARPA Software for Distributed Robotics (SDR) program. The core challen...
Andrew Howard, Lynne E. Parker, Gaurav S. Sukhatme
CCS
2005
ACM
15 years 3 months ago
An auctioning reputation system based on anomaly
Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities—finding a good bargain. These systems do not provide in...
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy,...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 1 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes