Sciweavers

188 search results - page 25 / 38
» Anomaly Detection Using the Dempster-Shafer Method
Sort
View
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
13 years 12 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ITIIS
2010
172views more  ITIIS 2010»
13 years 6 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
GLOBECOM
2008
IEEE
14 years 2 months ago
Information Theoretic Approach to Signal Feature Detection for Cognitive Radio
—Cognitive radio (CR) systems need to be able to adjust the transceiver characteristics in response to stimuli received from the radio environment. Therefore, monitoring the wire...
Mostafa Z. Afgani, Sinan Sinanovic, Harald Haas
ISSTA
2012
ACM
11 years 10 months ago
Static detection of brittle parameter typing
To avoid receiving incorrect arguments, a method specifies the expected type of each formal parameter. However, some parameter types are too general and have subtypes that the me...
Michael Pradel, Severin Heiniger, Thomas R. Gross
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton