Sciweavers

230 search results - page 15 / 46
» A Labeled Data Set for Flow-Based Intrusion Detection
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 8 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
IAT
2010
IEEE
13 years 5 months ago
Semi-supervised Learning for Opinion Detection
Research on opinion detection has shown that a large number of opinion-labeled data are necessary for capturing subtle opinions. However, opinion-labeled data, especially at the su...
Ning Yu, Sandra Kübler
IJRR
2010
214views more  IJRR 2010»
13 years 4 months ago
Object Recognition in 3D Point Clouds Using Web Data and Domain Adaptation
Over the last years, object detection has become a more and more active field of research in robotics. An important problem in object detection is the need for sufficient labeled ...
Kevin Lai, Dieter Fox
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü