Sciweavers

677 search results - page 87 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
LISA
2007
13 years 10 months ago
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
Damiano Bolzoni, Bruno Crispo, Sandro Etalle
ICMLA
2008
13 years 9 months ago
Detection of Sequential Outliers Using a Variable Length Markov Model
Mining for outliers in sequential databases is crucial to forward appropriate analysis of data. Therefore, many approaches for the discovery of such anomalies have been proposed. ...
Cécile Low-Kam, Anne Laurent, Maguelonne Te...
MVA
2007
150views Computer Vision» more  MVA 2007»
13 years 9 months ago
Detecting the Degree of Anomal in Security Video
We have developed a method that can discriminate anomalous image sequences for more efficiently utilizing security videos. To match the wide popularity of security cameras, the me...
Kyoko Sudo, Tatsuya Osawa, Xiaojun Wu, Kaoru Wakab...
CASES
2005
ACM
13 years 9 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
ACSAC
2008
IEEE
14 years 2 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...