Sciweavers

8177 search results - page 239 / 1636
» Detecting System Emulators
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 4 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
AAAI
2007
15 years 3 months ago
COD: Online Temporal Clustering for Outbreak Detection
We present Cluster Onset Detection (COD), a novel algorithm to aid in detection of epidemic outbreaks. COD employs unsupervised learning techniques in an online setting to partiti...
Tomás Singliar, Denver Dash
102
Voted
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 6 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
HICSS
1994
IEEE
157views Biometrics» more  HICSS 1994»
15 years 5 months ago
A Protein Family Classification Method for Analysis of Large DNA Sequences
A method is described for identification and classification of proteins encoded in large DNA sequences. Previously, an automated system was introduced for the general detection of...
Steven Henikoff, Jorja G. Henikoff
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
15 years 7 months ago
DYSWIS: An architecture for automated diagnosis of networks
As the complexity of networked systems increases, we need mechanisms to automatically detect failures in the network and diagnose the cause of such failures. To realize true self-...
Vishal Kumar Singh, Henning Schulzrinne, Kai Miao