Sciweavers

912 search results - page 46 / 183
» Anomaly
Sort
View
HASE
2007
IEEE
14 years 3 months ago
Analytic Model for Web Anomalies Classification
In this paper, an analytic technique is proposed to improve the dynamic web application quality and reliability. The technique integrates orthogonal defect classification (ODC), a...
Nasser Alaeddine, Jeff Tian
ACSAC
2006
IEEE
14 years 2 months ago
Anomaly Based Web Phishing Page Detection
Many anti-phishing schemes have recently been proposed in literature. Despite all those efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that p...
Ying Pan, Xuhua Ding
ICDCSW
2006
IEEE
14 years 2 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy
IAW
2003
IEEE
14 years 2 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
IWIA
2003
IEEE
14 years 2 months ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...