A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
Most recommender systems present recommended products in lists to the user. By doing so, much information is lost about the mutual similarity between recommended products. We prop...
Martijn Kagie, Michiel C. van Wezel, Patrick J. F....
Abstract. This paper describes the theoretical background and the implementation of dbrec, a music recommendation system built on top of DBpedia, offering recommendations for more ...