Sciweavers

323 search results - page 46 / 65
» Alert Detection in System Logs
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 1 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
SIGMOD
2003
ACM
196views Database» more  SIGMOD 2003»
14 years 7 months ago
Aurora: A Data Stream Management System
The Aurora system [1] is an experimental data stream management system with a fully functional prototype. It includes both a graphical development environment, and a runtime syste...
Daniel J. Abadi, Donald Carney, Ugur Çetint...
CONEXT
2007
ACM
13 years 9 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
WWW
2009
ACM
14 years 8 months ago
Rare item detection in e-commerce site
As the largest online marketplace in the world, eBay has a huge inventory where there are plenty of great rare items with potentially large, even rapturous buyers. These items are...
Dan Shen, Xiaoyuan Wu, Alvaro Bolivar
ICRA
2009
IEEE
141views Robotics» more  ICRA 2009»
14 years 2 months ago
Detecting repeated motion patterns via Dynamic Programming using motion density
— In this paper, we propose a method that detects repeated motion patterns in a long motion sequence efficiently. Repeated motion patterns are the structured information that ca...
Koichi Ogawara, Yasufumi Tanabe, Ryo Kurazume, Tsu...