Sciweavers

138 search results - page 12 / 28
» Hybrid Feature Selection for Modeling Intrusion Detection Sy...
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 8 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
RAID
1999
Springer
14 years 4 days ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
ICCCN
2007
IEEE
14 years 2 months ago
Lagniappe: Multi-* Programming Made Simple
—The emergence of multi-processor, multi-threaded architectures (referred to as multi- architectures) facilitates the design of high-throughput request processing systems (e.g., ...
Taylor L. Riché, R. Greg Lavender, Harrick ...
ENTCS
2007
156views more  ENTCS 2007»
13 years 7 months ago
Bounded Model Checking with Parametric Data Structures
Bounded Model Checking (BMC) is a successful refutation method to detect errors in not only circuits and other binary systems but also in systems with more complex domains like ti...
Erika Ábrahám, Marc Herbstritt, Bern...
MVA
2002
261views Computer Vision» more  MVA 2002»
13 years 7 months ago
Detecting Faces in Color Images Using an Adaptive Color Model and Salient Features
Face detection has many interesting applications such as a face recognition system, a surveillance system, and videolimage indexing system. In this paper, we propose a new method ...
Hang-Bong Kang