Sciweavers

164 search results - page 5 / 33
» Application Intrusion Detection using Language Library Calls
Sort
View
IFIP
2010
Springer
13 years 5 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor
ECOOP
2005
Springer
14 years 1 months ago
Static Deadlock Detection for Java Libraries
Library writers wish to provide a guarantee not only that each procedure in the library performs correctly in isolation, but also that the procedures perform correctly when run in ...
Amy Williams, William Thies, Michael D. Ernst
SAINT
2003
IEEE
14 years 22 days ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
IAT
2010
IEEE
13 years 5 months ago
Intention Recognition with Event Calculus Graphs
Intention recognition has significant applications in ambient intelligence, for example in assisted living and care of the elderly, in games and in intrusion and other crime detec...
Fariba Sadri
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
13 years 11 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras