Sciweavers

322 search results - page 21 / 65
» A System for in-Network Anomaly Detection
Sort
View
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
CORR
2008
Springer
192views Education» more  CORR 2008»
13 years 6 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 11 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 7 months ago
Dendritic Cells for Real-Time Anomaly Detection
Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the ystem. The behaviour of human DCs is abstracted to form an algorithm suitable...
Julie Greensmith, Uwe Aickelin
ICARIS
2005
Springer
14 years 1 months ago
A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques
The (randomized) real-valued negative selection algorithm is an anomaly detection approach, inspired by the negative selection immune system principle. The algorithm was proposed t...
Thomas Stibor, Jonathan Timmis, Claudia Eckert