Sciweavers

587 search results - page 36 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
DSN
2009
IEEE
14 years 5 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 4 months ago
Fixed-Period Packet Sampling and its Application to Flow Rate Estimation
Abstract— We propose a packet sampling strategy called fixedperiod sampling, which selects at most one packet in every fixedlength period. Under the fixed-period sampling, the...
Sadayoshi Ito, Kousuke Uchiyama, Shigeo Shioda
ANSS
2006
IEEE
14 years 4 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
ICDIM
2010
IEEE
13 years 8 months ago
Visualizing e-Government portal and its performance in WEBVS
An e-Government portal is responsible to provide news, information and services to citizens, merchants and tourists in a reliable way. Previously, we proposed a Web Monitoring Sys...
Ho Si Meng, Simon Fong
JCDL
2011
ACM
374views Education» more  JCDL 2011»
13 years 1 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel