Sciweavers

1804 search results - page 178 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
DAGM
2003
Springer
15 years 9 months ago
Real-Time Recognition of 3D-Pointing Gestures for Human-Machine-Interaction
We present a system capable of visually detecting pointing gestures and estimating the 3D pointing direction in real-time. We use Hidden Markov Models (HMMs) trained on different ...
Kai Nickel, Rainer Stiefelhagen
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 8 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ICIW
2009
IEEE
15 years 11 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
VIROLOGY
2010
128views more  VIROLOGY 2010»
15 years 2 months ago
Auto-Sign: an automatic signature generator for high-speed malware filtering devices
This research proposes a novel automatic method (termed Auto-Sign) for extracting unique signatures of malware executables to be used by high-speed malware filtering devices based...
Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Roka...
133
Voted
ICST
2009
IEEE
15 years 11 months ago
Quality Assurance of Software Applications Using the In Vivo Testing Approach
Software products released into the field typically have some number of residual defects that either were not detected or could not have been detected during testing. This may be...
Christian Murphy, Gail E. Kaiser, Ian Vo, Matt Chu