Sciweavers

765 search results - page 95 / 153
» Detecting Anomalies and Intruders
Sort
View
66
Voted
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
15 years 6 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley
ICARIS
2007
Springer
15 years 6 months ago
A Novel Immune Inspired Approach to Fault Detection
This paper presents a novel immune inspired algorithm, named DERA (Dynamic Effector Regulatory Algorithm), aimed at fault detection and other anomaly detection problems. It integr...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....
ITIIS
2008
110views more  ITIIS 2008»
14 years 12 months ago
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
Sun Ho Kim, Byeong-hee Roh
90
Voted
ICASSP
2011
IEEE
14 years 3 months ago
Multi-stage infrared stationary human detection
Detecting stationary human targets is crucial in ensuring safe operation of unmanned ground vehicles. In this paper, a multi-stage detection algorithm for stationary humans in inf...
Alex Lipchen Chan
ISPEC
2005
Springer
15 years 5 months ago
An Email Worm Vaccine Architecture
We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...