Sciweavers

8177 search results - page 193 / 1636
» Detecting System Emulators
Sort
View
RAID
1999
Springer
15 years 5 months ago
Misuse Detection in Database Systems Through User Profiling
Christina Yip Chung, Michael Gertz, Karl N. Levitt
RAID
1999
Springer
15 years 5 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
80
Voted
CONCUR
1998
Springer
15 years 5 months ago
Detecting Deadlocks in Concurrent Systems
Lisbeth Fajstrup, Eric Goubault, Martin Rauß...
71
Voted
SAC
1997
ACM
15 years 4 months ago
CHECK: a document plagiarism detection system
Antonio Si, Hong Va Leong, Rynson W. H. Lau