Sciweavers

1191 search results - page 133 / 239
» Distributed Detection of Information Flows
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
CAV
2000
Springer
97views Hardware» more  CAV 2000»
14 years 1 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
IVC
2002
148views more  IVC 2002»
13 years 8 months ago
Detecting lameness using 'Re-sampling Condensation' and 'multi-stream cyclic hidden Markov models'
A system for the tracking and classification of livestock movements is presented. The combined `tracker-classifier' scheme is based on a variant of Isard and Blakes `Condensa...
Derek R. Magee, Roger D. Boyle
VIZSEC
2004
Springer
14 years 2 months ago
Email archive analysis through graphical visualization
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
VIZSEC
2004
Springer
14 years 2 months ago
NVisionIP: netflow visualizations of system state for security situational awareness
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
Kiran Lakkaraju, William Yurcik, Adam J. Lee