Sciweavers

33 search results - page 3 / 7
» Labeled VoIP Data-Set for Intrusion Detection Evaluation
Sort
View
ACMSE
2005
ACM
15 years 3 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ICDCSW
2005
IEEE
15 years 3 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
SDM
2003
SIAM
156views Data Mining» more  SDM 2003»
14 years 10 months ago
Detection of Underrepresented Biological Sequences using Class-Conditional Distribution Models
A labeled sequence data set related to a certain biological property is often biased and, therefore, does not completely capture its diversity in nature. To reduce this sampling b...
Slobodan Vucetic, Dragoljub Pokrajac, Hongbo Xie, ...
ACL
2006
14 years 10 months ago
Factorizing Complex Models: A Case Study in Mention Detection
As natural language understanding research advances towards deeper knowledge modeling, the tasks become more and more complex: we are interested in more nuanced word characteristi...
Radu Florian, Hongyan Jing, Nanda Kambhatla, Imed ...
SAC
2010
ACM
15 years 4 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...