Sciweavers

95 search results - page 13 / 19
» Detecting Motifs in System Call Sequences
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
CCS
2008
ACM
13 years 9 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
ECCV
2006
Springer
14 years 9 months ago
Robust Attentive Behavior Detection by Non-linear Head Pose Embedding and Estimation
We present a new scheme to robustly detect a type of human attentive behavior, which we call frequent change in focus of attention (FCFA), from video sequences. FCFA behavior can b...
Nan Hu, Weimin Huang, Surendra Ranganath
ICRA
2009
IEEE
248views Robotics» more  ICRA 2009»
14 years 2 months ago
Moving obstacle detection in highly dynamic scenes
Abstract— We address the problem of vision-based multiperson tracking in busy pedestrian zones using a stereo rig mounted on a mobile platform. Specifically, we are interested i...
Andreas Ess, Bastian Leibe, Konrad Schindler, Luc ...
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 5 months ago
Detecting Novel Discrepancies in Communication Networks
Abstract--We address the problem of detecting characteristic patterns in communication networks. We introduce a scalable approach based on set-system discrepancy. By implicitly lab...
James Abello, Tina Eliassi-Rad, Nishchal Devanur