Sciweavers

323 search results - page 37 / 65
» Alert Detection in System Logs
Sort
View
BPM
2009
Springer
157views Business» more  BPM 2009»
13 years 11 months ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
SEC
2008
13 years 11 months ago
A Live Digital Forensic system for Windows networks
This paper presents FOXP (computer FOrensic eXPerience), an open source project to support network Live Digital Forensics (LDF), where the network nodes run a Windows NT family Ope...
Roberto Battistoni, Alessandro Di Biagio, Roberto ...
SIGIR
2010
ACM
14 years 1 months ago
Ready to buy or just browsing?: detecting web searcher goals from interaction data
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein
CEAS
2006
Springer
14 years 1 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
ICMLA
2007
13 years 11 months ago
Soft Failure Detection Using Factorial Hidden Markov Models
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an ofï¬...
Guillaume Bouchard, Jean-Marc Andreoli