Sciweavers

587 search results - page 71 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
RAID
2010
Springer
13 years 8 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
14 years 7 months ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
ACCV
2010
Springer
13 years 5 months ago
Human Detection in Video over Large Viewpoint Changes
In this paper, we aim to detect human in video over large viewpoint changes which is very challenging due to the diversity of human appearance and motion from a wide spread of view...
Genquan Duan, Haizhou Ai, Shihong Lao
KDD
2004
ACM
171views Data Mining» more  KDD 2004»
14 years 10 months ago
Integrating Web Conceptual Modeling and Web Usage Mining
We present a case study about the application of the inductive database approach to the analysis of Web logs. We consider rich XML Web logs ? called conceptual logs ? that are gen...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Robe...
ICDE
2007
IEEE
207views Database» more  ICDE 2007»
14 years 11 months ago
SIGOPT: Using Schema to Optimize XML Query Processing
There has been a great deal of work in recent years on processing and optimizing queries against XML data. Typically in these previous works, schema information is not considered,...
Stelios Paparizos, Jignesh M. Patel, H. V. Jagadis...