Sciweavers

445 search results - page 65 / 89
» Anomalies in ontologies with rules
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 11 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
UAI
2008
13 years 8 months ago
A Game-Theoretic Analysis of Updating Sets of Probabilities
We consider how an agent should update her uncertainty when it is represented by a set P of probability distributions and the agent observes that a random variable X takes on valu...
Peter Grünwald, Joseph Y. Halpern
AI
2007
Springer
13 years 7 months ago
On the evaluation of argumentation formalisms
Argumentation theory has become an important topic in the field of AI. The basic idea is to construct arguments in favor and against a statement, to select the “acceptable” o...
Martin Caminada, Leila Amgoud
CN
2007
106views more  CN 2007»
13 years 7 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto