Sciweavers

126 search results - page 14 / 26
» A Probabilistic Method for Detecting Anomalous Program Behav...
Sort
View
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
13 years 11 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
CAV
2006
Springer
146views Hardware» more  CAV 2006»
13 years 11 months ago
Termination Analysis with Calling Context Graphs
We introduce calling context graphs and various static and theorem proving based analyses that together provide a powerful method for proving termination of programs written in fea...
Panagiotis Manolios, Daron Vroon
PSB
2004
13 years 8 months ago
Phylogenetic Motif Detection by Expectation-Maximization on Evolutionary Mixtures
ct The preferential conservation of transcription factor binding sites implies that non-coding sequence data from related species will prove a powerful asset to motif discovery. We...
Alan M. Moses, Derek Y. Chiang, Michael B. Eisen
TAICPART
2010
IEEE
133views Education» more  TAICPART 2010»
13 years 5 months ago
Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs
Abstract. Writing multithreaded software for multicore computers confronts many developers with the difficulty of finding parallel programming errors. In the past, most parallel d...
Frank Eichinger, Victor Pankratius, Philipp W. L. ...
IEEEARES
2006
IEEE
14 years 1 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti