Sciweavers

765 search results - page 99 / 153
» Detecting Anomalies and Intruders
Sort
View
IAT
2007
IEEE
15 years 6 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
CORR
2008
Springer
125views Education» more  CORR 2008»
14 years 12 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
ICASSP
2011
IEEE
14 years 3 months ago
Detection of anomalous events from unlabeled sensor data in smart building environments
This paper presents a robust unsupervised learning approach for detection of anomalies in patterns of human behavior using multi-modal smart environment sensor data. We model the ...
Padmini Jaikumar, Aca Gacic, Burton Andrews, Micha...
LISA
2007
15 years 2 months ago
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
Damiano Bolzoni, Bruno Crispo, Sandro Etalle
94
Voted
ICMLA
2008
15 years 1 months ago
Detection of Sequential Outliers Using a Variable Length Markov Model
Mining for outliers in sequential databases is crucial to forward appropriate analysis of data. Therefore, many approaches for the discovery of such anomalies have been proposed. ...
Cécile Low-Kam, Anne Laurent, Maguelonne Te...