Sciweavers

230 search results - page 14 / 46
» A Labeled Data Set for Flow-Based Intrusion Detection
Sort
View
VLDB
2005
ACM
153views Database» more  VLDB 2005»
14 years 7 months ago
An effective and efficient algorithm for high-dimensional outlier detection
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
Charu C. Aggarwal, Philip S. Yu
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
14 years 1 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
BMCBI
2010
143views more  BMCBI 2010»
13 years 7 months ago
Evaluation of methods for detection of fluorescence labeled subcellular objects in microscope images
Background: Several algorithms have been proposed for detecting fluorescently labeled subcellular objects in microscope images. Many of these algorithms have been designed for spe...
Pekka Ruusuvuori, Tarmo Äijö, Sharif Cho...
WWW
2009
ACM
14 years 2 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 11 days ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...