Sciweavers

543 search results - page 66 / 109
» Detecting anomalies in data streams using statecharts
Sort
View
ANSS
2006
IEEE
15 years 3 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
ISSADS
2005
Springer
15 years 3 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
ICCD
1991
IEEE
65views Hardware» more  ICCD 1991»
15 years 1 months ago
Self-Timed Logic Using Current-Sensing Completion Detection (CSCD)
This article proposes a completion-detection method for efficiently implementing Boolean functions as self-timed logic structures. Current-Sensing Completion Detection, CSCD, allow...
Mark E. Dean, David L. Dill, Mark Horowitz
ACSC
2005
IEEE
15 years 3 months ago
Video Cut Detection using Frame Windows
Segmentation is the first step in managing data for many information retrieval tasks. Automatic audio transcriptions and digital video footage are typically continuous data sourc...
Seyed M. M. Tahaghoghi, Hugh E. Williams, James A....
CEC
2008
IEEE
15 years 4 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith