Sciweavers

587 search results - page 14 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
IJCNLP
2005
Springer
14 years 4 months ago
Improving Korean Speech Acts Analysis by Using Shrinkage and Discourse Stack
Abstract. A speech act is a linguistic action intended by a speaker. It is important to analyze the speech act for the dialogue understanding system because the speech act of an ut...
Kyungsun Kim, Youngjoong Ko, Jungyun Seo
ICDIM
2008
IEEE
14 years 5 months ago
NIDS based on payload word frequencies and anomaly of transitions
This paper presents a novel payload analysis method. Consecutive bytes are separated by boundary symbols and defined as words. The frequencies of word appearance and word to word ...
Sasa Mrdovic, Branislava Perunicic
WORM
2003
13 years 12 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
14 years 5 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
PST
2004
14 years 11 hour ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani