Sciweavers

765 search results - page 9 / 153
» Detecting Anomalies and Intruders
Sort
View
PAKDD
2005
ACM
133views Data Mining» more  PAKDD 2005»
14 years 26 days ago
An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning
This paper proposes a novel anomaly detection system for spacecrafts based on data mining techniques. It constructs a nonlinear probabilistic model w.r.t. behavior of a spacecraft ...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
DSN
2008
IEEE
14 years 1 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 7 months ago
An Effective Anomaly Detection Method in SMTP Traffic
We investigate an effective and robust mechanism for detecting SMTP traffic anomaly. Our detection method cumulates the deviation of current delivering status from history behavio...
Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu
NIPS
2004
13 years 8 months ago
Density Level Detection is Classification
We show that anomaly detection can be interpreted as a binary classification problem. Using this interpretation we propose a support vector machine (SVM) for anomaly detection. We...
Ingo Steinwart, Don R. Hush, Clint Scovel