Sciweavers

703 search results - page 92 / 141
» Graph-based anomaly detection
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 29 days ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CSREASAM
2006
13 years 10 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
ICSE
2009
IEEE-ACM
14 years 9 months ago
Discovering and representing systematic code changes
Software engineers often inspect program differences when reviewing others' code changes, when writing check-in comments, or when determining why a program behaves differentl...
Miryung Kim, David Notkin
SDM
2009
SIAM
124views Data Mining» more  SDM 2009»
14 years 5 months ago
Non-parametric Information-Theoretic Measures of One-Dimensional Distribution Functions from Continuous Time Series.
We study non-parametric measures for the problem of comparing distributions, which arise in anomaly detection for continuous time series. Non-parametric measures take two distribu...
Ali Dasdan, Paolo D'Alberto
SIGSOFT
2009
ACM
14 years 3 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...