Sciweavers

1804 search results - page 74 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
LISA
2008
15 years 9 days ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ICIP
1998
IEEE
15 years 11 months ago
A Compressed Video Database Structured for Active Browsing and Search
We describe a unique system called ViBE (video browsing environment) for browsing and searching large databases of video sequences. The system first computes the DC sequence for a...
Cüneyt M. Taskiran, Charles A. Bouman, Edward...
ICDM
2002
IEEE
173views Data Mining» more  ICDM 2002»
15 years 2 months ago
Mining Genes in DNA Using GeneScout
In this paper, we present a new system, called GeneScout, for predicting gene structures in vertebrate genomic DNA. The system contains specially designed hidden Markov models (HM...
Michael M. Yin, Jason Tsong-Li Wang
ICDCSW
2007
IEEE
15 years 4 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage