Sciweavers

703 search results - page 100 / 141
» Graph-based anomaly detection
Sort
View
WORM
2003
13 years 10 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
TPDS
2008
130views more  TPDS 2008»
13 years 8 months ago
Detecting VoIP Floods Using the Hellinger Distance
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and now competes favorably as one of the visible applications of the Internet. Nevertheless,...
Hemant Sengar, Haining Wang, Duminda Wijesekera, S...
IFIP
2010
Springer
13 years 6 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor
CVPR
2005
IEEE
14 years 10 months ago
Detection and Explanation of Anomalous Activities: Representing Activities as Bags of Event n-Grams
We present a novel representation and method for detecting and explaining anomalous activities in a video stream. Drawing from natural language processing, we introduce a represen...
Raffay Hamid, Amos Y. Johnson, Samir Batta, Aaron ...
ICPR
2006
IEEE
14 years 9 months ago
Defect detection in low-contrast glass substrates using anisotropic diffusion
In this research, we propose an anisotropic diffusion scheme to detect defects in low-contrast surface images and, especially, aim at glass substrates used in TFT-LCDs (Thin Film ...
Du-Ming Tsai, Shin-Min Chao, Yan-Hsin Tseng, Yuan-...