Sciweavers

912 search results - page 71 / 183
» Anomaly
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 9 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
CORR
2010
Springer
141views Education» more  CORR 2010»
13 years 9 months ago
FIFO anomaly is unbounded
Abstract. Virtual memory of computers is usually implemented by demand paging. For some page replacement algorithms the number of page faults may increase as the number of page fra...
Peter Fornai, Antal Iványi
CORR
2008
Springer
59views Education» more  CORR 2008»
13 years 9 months ago
On the Utility of Anonymized Flow Traces for Anomaly Detection
Martin Burkhart, Daniela Brauckhoff, Martin May
IJNSEC
2008
137views more  IJNSEC 2008»
13 years 8 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh