Sciweavers

1523 search results - page 74 / 305
» Detecting and Sketching the Common
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
HICSS
2005
IEEE
123views Biometrics» more  HICSS 2005»
15 years 3 months ago
Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions
Studies have shown that deception in the hiring process is common. Since more people are using computer mediated communication for job interviewing, it is important to understand ...
Patti Tilley, Joey F. George, Kent Marett
ICPADS
2005
IEEE
15 years 3 months ago
An Active Detecting Method Against SYN Flooding Attack
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
ACMSE
2005
ACM
15 years 3 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha
ISSADS
2005
Springer
15 years 3 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...