Sciweavers

336 search results - page 64 / 68
» Immune System Approaches to Intrusion Detection - A Review
Sort
View
78
Voted
CCS
2008
ACM
14 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
ICDE
2009
IEEE
251views Database» more  ICDE 2009»
15 years 11 months ago
Contextual Ranking of Keywords Using Click Data
The problem of automatically extracting the most interesting and relevant keyword phrases in a document has been studied extensively as it is crucial for a number of applications. ...
Utku Irmak, Vadim von Brzeski, Reiner Kraft
USENIX
2007
14 years 12 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
73
Voted
DEBS
2010
ACM
15 years 1 months ago
Logic-based representation, reasoning and machine learning for event recognition
Today’s organisations require techniques for automated transformation of the large data volumes they collect during their operations into operational knowledge. This requirement...
Alexander Artikis, Georgios Paliouras, Franç...
KBSE
2007
IEEE
15 years 3 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr