Sciweavers

2269 search results - page 334 / 454
» Behavioral Intrusion Detection
Sort
View
LCN
2005
IEEE
14 years 3 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed
DIMVA
2010
13 years 10 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
ALIFE
2005
13 years 10 months ago
Self-Organizing Hierarchies in Sensor and Communication Networks
We consider a hierarchical multicellular sensing and communication network, embedded in an ageless aerospace vehicle, that is expected to detect and react to multiple impacts and d...
Mikhail Prokopenko, Peter Wang, Philip Valencia, D...
CIKM
2010
Springer
13 years 8 months ago
Finding unusual review patterns using unexpected rules
In recent years, opinion mining attracted a great deal of research attention. However, limited work has been done on detecting opinion spam (or fake reviews). The problem is analo...
Nitin Jindal, Bing Liu, Ee-Peng Lim
WWW
2005
ACM
14 years 10 months ago
Information flow using edge stress factor
This paper shows how a corpus of instant messages can be employed to detect de facto communities of practice automatically. A novel algorithm based on the concept of Edge Stress F...
Franco Salvetti, Savitha Srinivasan