Sciweavers

103 search results - page 15 / 21
» Anomaly Detection through Registration
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 7 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
WWW
2009
ACM
14 years 1 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
ENGL
2007
103views more  ENGL 2007»
13 years 6 months ago
Fault Diagnosis of Manufacturing Processes via Genetic Algorithm Approach
—Instantaneous detection and diagnosis of various faults and break-downs in industrial processes is required to reduce production losses and damage to equipments. A solved knowle...
Stefania Gallova
TCSV
2008
174views more  TCSV 2008»
13 years 6 months ago
A Survey of Vision-Based Trajectory Learning and Analysis for Surveillance
Abstract--This paper presents a survey of trajectory-based activity analysis for visual surveillance. It describes techniques that use trajectory data to define a general set of ac...
Brendan Tran Morris, Mohan M. Trivedi
IFIP
2010
Springer
13 years 4 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor