Sciweavers

5934 search results - page 217 / 1187
» Detecting a Network Failure
Sort
View
140
Voted
ISI
2008
Springer
15 years 5 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
SAC
2010
ACM
15 years 12 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
115
Voted
ICONIP
2004
15 years 6 months ago
Collaborative Agent Learning Using Neurocomputing
In this paper we investigate techniques to train an agent to accomplish certain tasks. Artificial Neural Networks will be the technique used to the train the agent. This paper will...
Saulat Farooque, Ajith Abraham, Lakhmi C. Jain
CCS
2003
ACM
15 years 10 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
ICISC
2004
169views Cryptology» more  ICISC 2004»
15 years 6 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani