Sciweavers

357 search results - page 41 / 72
» Anomaly Detection Using Process Mining
Sort
View
ICDM
2006
IEEE
135views Data Mining» more  ICDM 2006»
14 years 3 months ago
SAXually Explicit Images: Finding Unusual Shapes
Among the visual features of multimedia content, shape is of particular interest because humans can often recognize objects solely on the basis of shape. Over the past three decad...
Li Wei, Eamonn J. Keogh, Xiaopeng Xi
ACSAC
2008
IEEE
14 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 4 months ago
Real Time Detection of Link Failures in Inter Domain Routing
Abstract— Measurements have shown that network path failures occur frequently in the Internet and physical link failures can cause network instability in large scale and severity...
Xiaobo Long, Biplab Sikdar
RAID
2009
Springer
14 years 4 months ago
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, ...
IJBRA
2007
114views more  IJBRA 2007»
13 years 9 months ago
Enhanced semantic access to the protein engineering literature using ontologies populated by text mining
: The biomedical literature is growing at an ever-increasing rate, which pronounces the need to support scientists with advanced, automated means of accessing knowledge. We investi...
René Witte, Thomas Kappler, Christopher J. ...