Sciweavers

703 search results - page 102 / 141
» Graph-based anomaly detection
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 26 days ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 10 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
CISS
2008
IEEE
13 years 8 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett
CVPR
2009
IEEE
1863views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Abnormal Crowd Behavior Detection using Social Force Model
In this paper we introduce a novel method to detect and localize abnormal behaviors in crowd videos using Social Force model. For this purpose, a grid of particles is placed ove...
Alexis Oyama, Mubarak Shah, Ramin Mehran
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 5 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee