Sciweavers

290 search results - page 3 / 58
» Attack detection in time series for recommender systems
Sort
View
OTM
2007
Springer
14 years 1 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...
ICISS
2007
Springer
13 years 11 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
DSOM
2009
Springer
14 years 2 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
GECCO
2007
Springer
156views Optimization» more  GECCO 2007»
14 years 1 months ago
Nonlinearity linkage detection for financial time series analysis
Standard detection algorithms for nonlinearity linkage fail when applied to typical problems in the analysis of financial time-series data. We explain how this failure arises whe...
Theodore Chiotis, Christopher D. Clack
LISA
2000
13 years 8 months ago
Aberrant Behavior Detection in Time Series for Network Monitoring
The open-source software RRDtool and Cricket provide a solution to the problem of collecting, storing, and visualizing service network time series data for the real-time monitorin...
Jake D. Brutlag