Sciweavers

531 search results - page 53 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
WEBI
2009
Springer
15 years 8 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 7 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
JIKM
2006
136views more  JIKM 2006»
15 years 1 months ago
Decision Support Systems Using Ensemble Genetic Programming
Abstract. This paper proposes a decision support system for tactical air combat environment using a combination of unsupervised learning for clustering the data and an ensemble of ...
Ajith Abraham, Crina Grosan
OSDI
2008
ACM
16 years 1 months ago
Digging for Data Structures
Because writing computer programs is hard, computer programmers are taught to use encapsulation and modularity to hide complexity and reduce the potential for errors. Their progra...
Anthony Cozzie, Frank Stratton, Hui Xue, Samuel T....
IAAI
1990
15 years 2 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers