Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and...
We study an application of image registration in the medical domain. Based on a 3-D hierarchical deformable registration algorithm, we developed a prototype for automatic register...
Mei Chen, Takeo Kanade, Henry A. Rowley, Dean Pome...
Abstract: Evidence of some attacks can be manifested by abnormal sequences of system calls of programs. Most approaches that have been developed so far mainly concentrate on some p...
Jidong Long, Daniel G. Schwartz, Sara Stoecklin, M...
The environment around us is progressively equipped with various sensors, producing data continuously. The applications using these data face many challenges, such as data stream i...