Sciweavers

314 search results - page 12 / 63
» An Evaluation of the Effectiveness of Measurement-based Anom...
Sort
View
ATAL
2011
Springer
12 years 7 months ago
Online anomaly detection in unmanned vehicles
Autonomy requires robustness. The use of unmanned (autonomous) vehicles is appealing for tasks which are dangerous or dull. However, increased reliance on autonomous robots increa...
Eliahu Khalastchi, Gal A. Kaminka, Meir Kalech, Ra...
MASCOTS
2010
13 years 9 months ago
OnTimeDetect: Dynamic Network Anomaly Notification in perfSONAR Deployments
To monitor and diagnose bottlenecks on network paths used for large-scale data transfers, there is an increasing trend to deploy measurement frameworks such as perfSONAR. These dep...
Prasad Calyam, Jialu Pu, Weiping Mandrawa, Ashok K...
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 7 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
IPPS
2010
IEEE
13 years 5 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...