Sciweavers

103 search results - page 14 / 21
» Anomaly Detection through Registration
Sort
View
CASES
2005
ACM
13 years 8 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
ISBI
2006
IEEE
14 years 7 months ago
Automatic registration of mammograms using texture-based anisotropic features
In this paper, an automated registration framework is proposed to identify the differences between corresponding mammographic images. The deformation between a pair of mammograms ...
Kexiang Wang, Hong Qin, Paul R. Fisher, Wei Zhao
GLOBECOM
2006
IEEE
14 years 23 days ago
On the Effectiveness of Service Registration-Based Worm Defense
— Existing Internet worm research focuses either on worm detection inside an AS, or on prevention of Internet-wide worm epidemic. But of more practical concern is how to repel wo...
Jin-Ho Kim, Hyogon Kim, Saewoong Bahk
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CCS
2004
ACM
14 years 3 days ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash