Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
Detecting and tracking latent factors from temporal data is an important task. Most existing algorithms for latent topic detection such as Nonnegative Matrix Factorization (NMF) h...
Bin Cao, Dou Shen, Jian-Tao Sun, Xuanhui Wang, Qia...
We present a data-driven, unsupervised method for unusual
scene detection from static webcams. Such time-lapse
data is usually captured with very low or varying framerate.
This ...
Michael D. Breitenstein, Helmut Grabner, Luc Van G...
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle...