Sciweavers

412 search results - page 30 / 83
» A Structural Framework for Modeling Multi-Stage Network Atta...
Sort
View
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
13 years 11 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
TASLP
2008
124views more  TASLP 2008»
13 years 7 months ago
Sparse Linear Regression With Structured Priors and Application to Denoising of Musical Audio
Abstract--We describe in this paper an audio denoising technique based on sparse linear regression with structured priors. The noisy signal is decomposed as a linear combination of...
Cédric Févotte, Bruno Torrésa...
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
13 years 5 months ago
Subgroup Discovery Meets Bayesian Networks -- An Exceptional Model Mining Approach
Whenever a dataset has multiple discrete target variables, we want our algorithms to consider not only the variables themselves, but also the interdependencies between them. We pro...
Wouter Duivesteijn, Arno J. Knobbe, Ad Feelders, M...
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 2 months ago
On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...
Krishna K. Ramachandran, Biplab Sikdar