Sciweavers

1503 search results - page 51 / 301
» Detecting Anomalies in Graphs
Sort
View
ITCC
2005
IEEE
15 years 9 months ago
Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection
Abstract: Evidence of some attacks can be manifested by abnormal sequences of system calls of programs. Most approaches that have been developed so far mainly concentrate on some p...
Jidong Long, Daniel G. Schwartz, Sara Stoecklin, M...
FEGC
2010
161views Biometrics» more  FEGC 2010»
15 years 5 months ago
Detecting anomalies in data streams using statecharts
The environment around us is progressively equipped with various sensors, producing data continuously. The applications using these data face many challenges, such as data stream i...
Vasile-Marian Scuturici, Dan-Mircea Suciu, Romain ...
CRITIS
2009
15 years 1 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...
INFOCOM
2011
IEEE
14 years 7 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
CVPR
2008
IEEE
16 years 6 months ago
Probabilistic image registration and anomaly detection by nonlinear warping
Automatic, defect tolerant registration of transmission electron microscopy (TEM) images poses an important and challenging problem for biomedical image analysis, e.g. in computat...
Verena Kaynig, Bernd Fischer, Joachim M. Buhmann