Sciweavers

8177 search results - page 184 / 1636
» Detecting System Emulators
Sort
View
108
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
—While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-...
Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta
67
Voted
COLING
2010
14 years 7 months ago
An ontology-driven system for detecting global health events
Text mining for global health surveillance is an emerging technology that is gaining increased attention from public health organisations and governments. The lack of multilingual...
Nigel Collier, Reiko Matsuda Goodwin, John McCrae,...
106
Voted
GLOBECOM
2007
IEEE
15 years 7 months ago
Impact of Correlation on Linear Precoding in QSTBC Coded Systems with Linear MSE Detection
— In this paper, we study a wireless multiple-input multiple-output system in a Rayleigh flat-fading environment with correlation among the transmit antennas. We assume that the...
Aydin Sezgin, Arogyaswami Paulraj, Mai Vu
ML
2010
ACM
155views Machine Learning» more  ML 2010»
14 years 11 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
ICASSP
2011
IEEE
14 years 4 months ago
Online anomaly detection with expert system feedback in social networks
In this paper, we propose examining the participants in various meetings or communications within a social network, and using sequential inference based on these participant lists...
Corinne Horn, Rebecca Willett