Sciweavers

323 search results - page 19 / 65
» Alert Detection in System Logs
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System
Abstract—Today vehicle theft rate is very high, thus tracking/alarming systems are being deployed with an increasingly popularity. These systems however bear some limitations suc...
Hui Song, Sencun Zhu, Guohong Cao
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 8 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
VVG
2003
140views Computer Vision» more  VVG 2003»
13 years 9 months ago
Semi-Automated Logging for Professional Media Applications
We report a novel method for logging and annotating video footage specifically for professional post-production and archivist end users. SALSA – Semi-Automated Logging with Sema...
J. W. Mateer, J. A. Robinson
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 1 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
ISICA
2009
Springer
14 years 3 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong