Sciweavers

2269 search results - page 348 / 454
» Behavioral Intrusion Detection
Sort
View
ICS
2010
Tsinghua U.
13 years 8 months ago
Decomposable and responsive power models for multicore processors using performance counters
Abstract—Power modeling based on performance monitoring counters (PMCs) has attracted the interest of many researchers since it become a quick approach to understand and analyse ...
Ramon Bertran, Marc González, Xavier Martor...
CCS
2008
ACM
14 years 2 days ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
ICDM
2010
IEEE
199views Data Mining» more  ICDM 2010»
13 years 8 months ago
Addressing Concept-Evolution in Concept-Drifting Data Streams
Abstract--The problem of data stream classification is challenging because of many practical aspects associated with efficient processing and temporal behavior of the stream. Two s...
Mohammad M. Masud, Qing Chen, Latifur Khan, Charu ...
CVPR
1998
IEEE
15 years 3 days ago
Action Recognition Using Probabilistic Parsing
A new approach to the recognition of temporal behaviors and activities is presented. The fundamental idea, inspired by work in speech recognition, is to divide the inference probl...
Aaron F. Bobick, Yuri A. Ivanov
WOSS
2004
ACM
14 years 3 months ago
Combining statistical monitoring and predictable recovery for self-management
Complex distributed Internet services form the basis not only of e-commerce but increasingly of mission-critical networkbased applications. What is new is that the workload and in...
Armando Fox, Emre Kiciman, David A. Patterson