Sciweavers

164 search results - page 11 / 33
» Selecting and Improving System Call Models for Anomaly Detec...
Sort
View
ISMB
1994
14 years 10 months ago
An Improved System for Exon Recognition and Gene Modeling in Human DNA Sequence
A new version of the GRAIL system (Uberbacher and Mural, 1991; Mural et al., 1992; Uberbacher et al., 1993), called GRAILII, has recently been developed (Xu et al., 1994). GRAILII...
Yin Xu, J. Ralph Einstein, Richard J. Mural, Manes...
AMM
2011
118views more  AMM 2011»
14 years 4 months ago
From Community Detection to Mentor Selection in Rating-Free Collaborative Filtering
—The number of resources or items that users can now access when navigating on the Web or using e-services, is so huge that these might feel lost due to the presence of too much ...
Armelle Brun, Sylvain Castagnos, Anne Boyer
ASIAN
2006
Springer
140views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Modeling Urgency in Component-Based Real-Time Systems
A component-based realtime system is a simple model for the server-client relation with time constraints. This paper presents an efficient algorithm, called a blackbox testing algo...
Nguyen Van Tang, Dang Van Hung, Mizuhito Ogawa
88
Voted
SPIN
2009
Springer
15 years 4 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
90
Voted
AHSWN
2006
206views more  AHSWN 2006»
14 years 9 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch