Sciweavers

257 search results - page 16 / 52
» A New Model for Dynamic Intrusion Detection
Sort
View
CDC
2008
IEEE
403views Control Systems» more  CDC 2008»
14 years 2 months ago
A collocation model for water-hammer dynamics with application to leak detection
— This paper presents a new model for so-called water hammer equations based on a collocation method. This model is shown to fairly represent possible leak effects in a pipeline ...
Flor Lizeth Torres Ortiz, Gildas Besancon, Didier ...
CCS
2009
ACM
14 years 2 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
ECCV
2004
Springer
14 years 1 months ago
Novelty Detection in Image Sequences with Dynamic Background
Abstract. We propose a new scheme for novelty detection in image sequences capable of handling non-stationary background scenarious, such as waving trees, rain and snow. Novelty de...
Fredrik Kahl, Richard I. Hartley, Volker Hilsenste...
RAID
2009
Springer
14 years 2 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 27 days ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...