Sciweavers

126 search results - page 14 / 26
» A Probabilistic Method for Detecting Anomalous Program Behav...
Sort
View
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 6 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
CAV
2006
Springer
146views Hardware» more  CAV 2006»
15 years 6 months ago
Termination Analysis with Calling Context Graphs
We introduce calling context graphs and various static and theorem proving based analyses that together provide a powerful method for proving termination of programs written in fea...
Panagiotis Manolios, Daron Vroon
115
Voted
PSB
2004
15 years 3 months ago
Phylogenetic Motif Detection by Expectation-Maximization on Evolutionary Mixtures
ct The preferential conservation of transcription factor binding sites implies that non-coding sequence data from related species will prove a powerful asset to motif discovery. We...
Alan M. Moses, Derek Y. Chiang, Michael B. Eisen
126
Voted
TAICPART
2010
IEEE
133views Education» more  TAICPART 2010»
15 years 27 days ago
Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs
Abstract. Writing multithreaded software for multicore computers confronts many developers with the difficulty of finding parallel programming errors. In the past, most parallel d...
Frank Eichinger, Victor Pankratius, Philipp W. L. ...
157
Voted
IEEEARES
2006
IEEE
15 years 8 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti