Sciweavers

201 search results - page 19 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
ACSAC
2004
IEEE
15 years 2 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
RAID
2004
Springer
15 years 4 months ago
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix
Anomaly detection is a promising approach to detecting intruders masquerading as valid users (called masqueraders). It creates a user profile and labels any behavior that deviates...
Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhik...
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 3 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
104
Voted
NFM
2011
223views Formal Methods» more  NFM 2011»
14 years 6 months ago
Generating Data Race Witnesses by an SMT-Based Analysis
Abstract. Data race is one of the most dangerous errors in multithreaded programming, and despite intensive studies, it remains a notorious cause of failures in concurrent systems....
Mahmoud Said, Chao Wang, Zijiang Yang, Karem Sakal...
PAMI
2010
249views more  PAMI 2010»
14 years 9 months ago
Object Detection with Discriminatively Trained Part-Based Models
—We describe an object detection system based on mixtures of multiscale deformable part models. Our system is able to represent highly variable object classes and achieves state-...
Pedro F. Felzenszwalb, Ross B. Girshick, David A. ...