Sciweavers

1804 search results - page 110 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
111
Voted
PODC
2000
ACM
15 years 2 months ago
Debugging distributed programs using controlled re-execution
Distributed programs are hard to write. A distributed debugger equipped with the mechanism to re-execute the traced computation in a controlled fashion can greatly facilitate the ...
Neeraj Mittal, Vijay K. Garg
82
Voted
IPM
2011
118views more  IPM 2011»
14 years 5 months ago
Detecting spam blogs from blog search results
Blogging has been an emerging media for people to express themselves. However, the presence of spam-blogs (also known as splogs) may reduce the value of blogs and blog search engi...
Linhong Zhu, Aixin Sun, Byron Choi
98
Voted
GECCO
2003
Springer
148views Optimization» more  GECCO 2003»
15 years 3 months ago
Structural and Functional Sequence Test of Dynamic and State-Based Software with Evolutionary Algorithms
Evolutionary Testing (ET) has been shown to be very successful for testing real world applications [10]. The original ET approach focusesonsearching for a high coverage of the test...
André Baresel, Hartmut Pohlheim, Sadegh Sad...
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
15 years 4 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley
IEEEARES
2010
IEEE
15 years 3 months ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...