Sciweavers

2236 search results - page 81 / 448
» Intrusion detection techniques and approaches
Sort
View
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
15 years 3 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
ICCSA
2005
Springer
15 years 3 months ago
A Novel Delaunay Simplex Technique for Detection of Crystalline Nuclei in Dense Packings of Spheres
The paper presents a new approach for revealing regions (nuclei) of crystalline structures in computer models of dense packings of spherical atoms using the Voronoi-Delaunay method...
Alexey V. Anikeenko, Marina L. Gavrilova, Nikolai ...
WORM
2003
14 years 11 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ICARIS
2005
Springer
15 years 3 months ago
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired by the negative selection immune system principle. The algorithm was proposed t...
Thomas Stibor, Jonathan Timmis, Claudia Eckert
ICIP
2001
IEEE
15 years 11 months ago
Improving a genetic algorithm segmentation by means of a fast edge detection technique
Thispaper presents a new hybrid range image segmentation approach. Two separate techniques are applied consecutively. First, iin edge based segmentation technique extracts the edg...
Angel Domingo Sappa, Vitoantonio Bevilacqua, Miche...