Sciweavers

290 search results - page 40 / 58
» Attack detection in time series for recommender systems
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar
WSC
1998
13 years 10 months ago
Getting Started in Simulation in Healthcare
To begin using simulation in healthcare, one must first recognize the types of problems or decisions that can best be analyzed using simulation. Once a problem has been identified...
Julie C. Lowery
IPPS
2009
IEEE
14 years 3 months ago
Crash fault detection in celerating environments
Failure detectors are a service that provides (approximate) information about process crashes in a distributed system. The well-known “eventually perfect” failure detector, 3P...
Srikanth Sastry, Scott M. Pike, Jennifer L. Welch
KDD
2004
ACM
207views Data Mining» more  KDD 2004»
14 years 9 months ago
Belief state approaches to signaling alarms in surveillance systems
Surveillance systems have long been used to monitor industrial processes and are becoming increasingly popular in public health and anti-terrorism applications. Most early detecti...
Kaustav Das, Andrew W. Moore, Jeff G. Schneider
CCS
2006
ACM
14 years 10 days ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...