Sciweavers

201 search results - page 22 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
ICRA
2007
IEEE
151views Robotics» more  ICRA 2007»
15 years 5 months ago
Sensor Analysis for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks
— This paper presents a sensor analysis based fault detection approach (which we call SAFDetection) that is used to monitor tightly-coupled multi-robot team tasks. Our approach a...
Xingyan Li, Lynne E. Parker
IJON
2006
146views more  IJON 2006»
14 years 11 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang
ETRICS
2006
15 years 2 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CORR
2010
Springer
206views Education» more  CORR 2010»
14 years 11 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
ACSAC
2004
IEEE
15 years 2 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...