Sciweavers

72 search results - page 2 / 15
» Two State-based Approaches to Program-based Anomaly Detectio...
Sort
View
104
Voted
DMIN
2006
152views Data Mining» more  DMIN 2006»
15 years 2 months ago
Anomaly Detection Using the Dempster-Shafer Method
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
91
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 1 months ago
Dempster-Shafer for Anomaly Detection
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
141
Voted
DSN
2008
IEEE
15 years 7 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
120
Voted
ACSAC
1998
IEEE
15 years 5 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
139
Voted
NDSS
2006
IEEE
15 years 7 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...