Sciweavers

479 search results - page 55 / 96
» Intrusion Detection Based on Data Mining
Sort
View
IPCCC
2007
IEEE
15 years 6 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
SAC
2010
ACM
15 years 6 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 3 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
SIGMOD
2005
ACM
150views Database» more  SIGMOD 2005»
15 years 12 months ago
BRAID: Stream Mining through Group Lag Correlations
The goal is to monitor multiple numerical streams, and determine which pairs are correlated with lags, as well as the value of each such lag. Lag correlations (and anticorrelation...
Yasushi Sakurai, Spiros Papadimitriou, Christos Fa...
SDM
2012
SIAM
312views Data Mining» more  SDM 2012»
13 years 2 months ago
Drought Detection of the Last Century: An MRF-based Approach
Droughts are one of the most damaging climate-related hazards. The late 1960s Sahel drought in Africa and the North American Dust Bowl of the 1930s are two examples of severe drou...
Qiang Fu, Arindam Banerjee, Stefan Liess, Peter K....