Sciweavers

912 search results - page 72 / 183
» Anomaly
Sort
View
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 8 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
CMOT
2007
92views more  CMOT 2007»
13 years 8 months ago
Anomaly detection in a mobile communication network
Alec Pawling, Nitesh V. Chawla, Gregory R. Madey
IVS
2006
240views more  IVS 2006»
13 years 8 months ago
Business process impact visualization and anomaly detection
Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes ...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, J&oum...
JHSN
2006
66views more  JHSN 2006»
13 years 8 months ago
Anomaly intrusion detection in wireless sensor networks
Vijay Bhuse, Ajay K. Gupta