Sciweavers

8177 search results - page 367 / 1636
» Detecting System Emulators
Sort
View
ESORICS
2003
Springer
15 years 9 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
133
Voted
ETRICS
2006
15 years 7 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
15 years 7 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
TIT
2008
73views more  TIT 2008»
15 years 3 months ago
Detection of Information Flows
Abstract-- Distributed detection of information flows by timing analysis is considered. Timing measurements are subject to perturbations and the insertion of chaff noise. Moreover,...
Ting He, Lang Tong
IEEEIAS
2009
IEEE
15 years 1 months ago
Detection of Abnormal Sound Using Multi-stage GMM for Surveillance Microphone
We developed a system that detects abnormal sound from sound signal observed by a surveillance microphone. Our system learns the "normal sound" from observation of the m...
Akinori Ito, Akihito Aiba, Masashi Ito, Shozo Maki...