Sciweavers

912 search results - page 99 / 183
» Anomaly
Sort
View
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
14 years 1 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
SIGGRAPH
1994
ACM
14 years 1 months ago
Illumination in diverse codimensions
This paper derives a model of diffuse and specular illumination in arbitrarily large dimensions, based on a few characteristics of material and light in 3-space. It then describes...
David C. Banks
ATC
2006
Springer
14 years 20 days ago
Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems
Self-healing relies on correct diagnosis of system malfunctioning. This paper presents a use-case based approach to self-diagnosis. Both a static and a dynamic model of a managed-s...
A. Reza Haydarlou, Benno J. Overeinder, Michel A. ...
TACS
1991
Springer
14 years 13 days ago
On Nets, Algebras and Modularity
We aim at a unified and coherent presentation of net models for concurrency like Petri nets and dataflow networks from the perspective of modularity and substitutivity. The major ...
Alexander Moshe Rabinovich, Boris A. Trakhtenbrot
CSREASAM
2007
13 years 10 months ago
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques
— In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole...
Maitreya Natu, Adarshpal S. Sethi