Sciweavers

703 search results - page 103 / 141
» Graph-based anomaly detection
Sort
View
IAT
2007
IEEE
14 years 16 days ago
High-Speed Network Traffic Acquisition for Agent Systems
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...
Pavel Celeda, Vojtech Krmicek, Martin Rehák...
ACSAC
2008
IEEE
14 years 3 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
DATE
2009
IEEE
151views Hardware» more  DATE 2009»
14 years 3 months ago
pTest: An adaptive testing tool for concurrent software on embedded multicore processors
—More and more processor manufacturers have launched embedded multicore processors for consumer electronics products because such processors provide high performance and low powe...
Shou-Wei Chang, Kun-Yuan Hsieh, Jenq Kuen Lee
SGAI
2009
Springer
14 years 3 months ago
Ontology-Driven Hypothesis Generation to Explain Anomalous Patient Responses to Treatment
Within the medical domain there are clear expectations as to how a patient should respond to treatments administered. When these responses are not observed it can be challenging fo...
Laura Moss, Derek H. Sleeman, Malcolm Sim, Malcolm...
ICASSP
2008
IEEE
14 years 3 months ago
Variance reduction with neighborhood smoothing for local intrinsic dimension estimation
Local intrinsic dimension estimation has been shown to be useful for many tasks such as image segmentation, anomaly detection, and de-biasing global dimension estimates. Of partic...
Kevin M. Carter, Alfred O. Hero