Sciweavers

587 search results - page 92 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
DIMVA
2004
13 years 10 months ago
LIV - The Linux Integrated Viruswall
This paper presents a system developed in Linux aiming the protection of local area networks containing Windows workstations against malicious agents. The developed solution, named...
Teobaldo A. Dantas de Medeiros, Paulo S. Motta Pir...
IV
2008
IEEE
133views Visualization» more  IV 2008»
14 years 3 months ago
Mining Scholarly Semantic Networks from the Web
With the increased usage of the Web and its availability of data, various scholarly information is now available on the Web. Extraction, aggregation, and visualization of such inf...
Mizuki Oka, Yutaka Matsuo
WETICE
2007
IEEE
14 years 3 months ago
Collaborative Intrusion Prevention
Intrusion Prevention Systems (IPSs) have long been proposed as a defense against attacks that propagate too fast for any manual response to be useful. In an important class of IPS...
Simon P. Chung, Aloysius K. Mok
CIVR
2007
Springer
139views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Video search in concept subspace: a text-like paradigm
Though both quantity and quality of semantic concept detection in video are continuously improving, it still remains unclear how to exploit these detected concepts as semantic ind...
Xirong Li, Dong Wang, Jianmin Li, Bo Zhang
CAI
2005
Springer
13 years 9 months ago
Development of Threat Evaluation Tool for Distributed Network Environment
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...