Sciweavers

1503 search results - page 96 / 301
» Detecting Anomalies in Graphs
Sort
View
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
15 years 10 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
AAAI
2006
15 years 5 months ago
Domain-Independent Structured Duplicate Detection
The scalability of graph-search algorithms can be greatly extended by using external memory, such as disk, to store generated nodes. We consider structured duplicate detection, an...
Rong Zhou, Eric A. Hansen
ATC
2006
Springer
15 years 8 months ago
Multi-level Model-Based Self-diagnosis of Distributed Object-Oriented Systems
Self-healing relies on correct diagnosis of system malfunctioning. This paper presents a use-case based approach to self-diagnosis. Both a static and a dynamic model of a managed-s...
A. Reza Haydarlou, Benno J. Overeinder, Michel A. ...
COMPUTING
1999
99views more  COMPUTING 1999»
15 years 4 months ago
A Minimal Line Property Preserving Representation of Line Images
In line image understandingaminimal lineproperty preserving(MLPP)graphoftheimagecompliments the structural information in geometric graph representations like the run graph. With ...
Mark Burge, Walter G. Kropatsch
WWW
2009
ACM
15 years 11 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...