Sciweavers

201 search results - page 19 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
132
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
RAID
2004
Springer
15 years 8 months ago
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix
Anomaly detection is a promising approach to detecting intruders masquerading as valid users (called masqueraders). It creates a user profile and labels any behavior that deviates...
Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhik...
114
Voted
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 7 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
NFM
2011
223views Formal Methods» more  NFM 2011»
14 years 10 months ago
Generating Data Race Witnesses by an SMT-Based Analysis
Abstract. Data race is one of the most dangerous errors in multithreaded programming, and despite intensive studies, it remains a notorious cause of failures in concurrent systems....
Mahmoud Said, Chao Wang, Zijiang Yang, Karem Sakal...
PAMI
2010
249views more  PAMI 2010»
15 years 1 months ago
Object Detection with Discriminatively Trained Part-Based Models
—We describe an object detection system based on mixtures of multiscale deformable part models. Our system is able to represent highly variable object classes and achieves state-...
Pedro F. Felzenszwalb, Ross B. Girshick, David A. ...