Sciweavers

290 search results - page 4 / 58
» Attack detection in time series for recommender systems
Sort
View
SSDBM
2005
IEEE
175views Database» more  SSDBM 2005»
14 years 3 months ago
Assumption-Free Anomaly Detection in Time Series
Recent advancements in sensor technology have made it possible to collect enormous amounts of data in real time. However, because of the sheer volume of data most of it will never...
Li Wei, Nitin Kumar, Venkata Nishanth Lolla, Eamon...
STDBM
2004
Springer
127views Database» more  STDBM 2004»
14 years 3 months ago
Condition Evaluation for Speculative Systems: a Streaming Time Series Case
Application systems often need to react with certain actions whenever some preset conditions are satisfied. In many cases, the evaluation of these conditions takes long time, but...
Xiaoyang Sean Wang, Like Gao, Min Wang
ESORICS
2004
Springer
14 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 3 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
WWW
2004
ACM
14 years 10 months ago
Shilling recommender systems for fun and profit
Recommender systems have emerged in the past several years as an effective way to help people cope with the problem of information overload. One application in which they have bec...
Shyong K. Lam, John Riedl