Sciweavers

892 search results - page 86 / 179
» Coordinated Scan Detection
Sort
View
125
Voted
CCS
2003
ACM
15 years 8 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
USS
2004
15 years 4 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
BMCBI
2010
181views more  BMCBI 2010»
15 years 3 months ago
Intensity dependent estimation of noise in microarrays improves detection of differentially expressed genes
Background: In many microarray experiments, analysis is severely hindered by a major difficulty: the small number of samples for which expression data has been measured. When one ...
Amit Zeisel, Amnon Amir, Wolfgang J. Köstler,...
COMPSAC
2002
IEEE
15 years 8 months ago
Tool Support for Distributed Inspection
Software inspection is one of the best practices for detecting and removing defects early in the software development process. We present a tool to support geographically distribu...
Filippo Lanubile, Teresa Mallardo
ISSAC
1997
Springer
102views Mathematics» more  ISSAC 1997»
15 years 7 months ago
A Numerical Absolute Primality Test for Bivariate Polynomials
We give a new numerical absolute primality criterion for bivariate polynomials. This test is based on a simple property of the monomials appearing after a generic linear change of...
André Galligo, Stephen M. Watt