Sciweavers

120 search results - page 10 / 24
» Group detection in mobility traces
Sort
View
JSS
2002
198views more  JSS 2002»
13 years 7 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
TMA
2010
Springer
120views Management» more  TMA 2010»
13 years 5 months ago
DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections
Spurious Retransmission Timeouts in TCP connections have been extensively studied in the scientific literature, particularly for their relevance in cellular mobile networks. At the...
Antonio Barbuzzi, Gennaro Boggia, Luigi Alfredo Gr...
PR
2008
145views more  PR 2008»
13 years 7 months ago
Probabilistic suffix models for API sequence analysis of Windows XP applications
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigat...
Geoffrey Mazeroff, Jens Gregor, Michael G. Thomaso...
ACSAC
2005
IEEE
14 years 1 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
WETICE
2005
IEEE
14 years 1 months ago
Host Behaviour Based Early Detection of Worm Outbreaks in Internet Backbones
We propose a novel near real-time method for early detection of worm outbreaks in high-speed Internet backbones. Our method attributes several behavioural properties to individual...
Thomas Dübendorfer, Bernhard Plattner