Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been...
Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes ...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, J&oum...
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Abstract. In this conceptual paper, we report on studies and initial definitions of an immune-inspired approach to temporal anomaly detection problems, where there is a strict temp...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....