Sciweavers

677 search results - page 61 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
TSMC
2010
13 years 2 months ago
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
Mahbod Tavallaee, Natalia Stakhanova, Ali A. Ghorb...
AAAI
2012
11 years 10 months ago
Learning Behavior Models for Hybrid Timed Systems
A tailored model of a system is the prerequisite for various analysis tasks, such as anomaly detection, fault identification, or quality assurance. This paper deals with the algo...
Oliver Niggemann, Benno Stein, Asmir Vodencarevic,...
EVOW
2009
Springer
13 years 11 months ago
Testing Detector Parameterization Using Evolutionary Exploit Generation
Abstract. The testing of anomaly detectors is considered from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly ...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood, M...
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...