Sciweavers

458 search results - page 33 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 5 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
14 years 5 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
IMCSIT
2010
13 years 8 months ago
Automatic Detection of Prominent Words in Russian Speech
Abstract--An experimental research with a goal to automatically detect prominent words in Russian speech is presented in this paper. The proposed automatic prominent word detection...
Daniil Kocharov
ISW
2005
Springer
14 years 4 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
DATAMINE
2008
143views more  DATAMINE 2008»
13 years 11 months ago
Automatically countering imbalance and its empirical relationship to cost
Learning from imbalanced datasets presents a convoluted problem both from the modeling and cost standpoints. In particular, when a class is of great interest but occurs relatively...
Nitesh V. Chawla, David A. Cieslak, Lawrence O. Ha...