Sciweavers

703 search results - page 92 / 141
» Graph-based anomaly detection
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 6 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
137
Voted
CSREASAM
2006
15 years 3 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
98
Voted
ICSE
2009
IEEE-ACM
16 years 3 months ago
Discovering and representing systematic code changes
Software engineers often inspect program differences when reviewing others' code changes, when writing check-in comments, or when determining why a program behaves differentl...
Miryung Kim, David Notkin
SDM
2009
SIAM
124views Data Mining» more  SDM 2009»
15 years 11 months ago
Non-parametric Information-Theoretic Measures of One-Dimensional Distribution Functions from Continuous Time Series.
We study non-parametric measures for the problem of comparing distributions, which arise in anomaly detection for continuous time series. Non-parametric measures take two distribu...
Ali Dasdan, Paolo D'Alberto
SIGSOFT
2009
ACM
15 years 9 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...