Sciweavers

912 search results - page 85 / 183
» Anomaly
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 9 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
ALT
2006
Springer
14 years 5 months ago
The Complexity of Learning SUBSEQ (A)
Higman showed that if A is any language then SUBSEQ(A) is regular, where SUBSEQ(A) is the language of all subsequences of strings in A. We consider the following inductive inferenc...
Stephen A. Fenner, William I. Gasarch
SAC
2010
ACM
14 years 3 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
INFOCOM
2009
IEEE
14 years 3 months ago
Considerations for Sizing Buffers in Optical Packet Switched Networks
— Optical packet switches of the foreseeable future are expected to have severely limited buffering capability, since storage of optical signals remains a difficult and expensiv...
Arun Vishwanath, Vijay Sivaraman, George N. Rouska...
ICANNGA
2009
Springer
134views Algorithms» more  ICANNGA 2009»
14 years 3 months ago
A Generative Model for Self/Non-self Discrimination in Strings
A statistical generative model is presented as an alternative to negative selection in anomaly detection of string data. We extend the probabilistic approach to binary classificat...
Matti Pöllä