Sciweavers

188 search results - page 28 / 38
» Anomaly Detection Using the Dempster-Shafer Method
Sort
View
ICECCS
2002
IEEE
85views Hardware» more  ICECCS 2002»
14 years 19 days ago
Syntactic Fault Patterns in OO Programs
Although program faults are widely studied, there are many aspects of faults that we still do not understand, particularly about OO software. In addition to the simple fact that o...
Roger T. Alexander, Jeff Offutt, James M. Bieman
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 12 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICITA
2005
IEEE
14 years 1 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
CISS
2008
IEEE
13 years 7 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett
JPDC
2006
253views more  JPDC 2006»
13 years 7 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang