Sciweavers

138 search results - page 13 / 28
» Hybrid Feature Selection for Modeling Intrusion Detection Sy...
Sort
View
JCIT
2008
172views more  JCIT 2008»
13 years 7 months ago
Rough Wavelet Hybrid Image Classification Scheme
This paper introduces a new computer-aided classification system for detection of prostate cancer in Transrectal Ultrasound images (TRUS). To increase the efficiency of the comput...
Hala S. Own, Aboul Ella Hassanien
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
CVPR
2005
IEEE
14 years 1 months ago
The Distinctiveness, Detectability, and Robustness of Local Image Features
We introduce a new method that characterizes typical local image features (e.g., SIFT [9], phase feature [3]) in terms of their distinctiveness, detectability, and robustness to i...
Gustavo Carneiro, Allan D. Jepson
RAID
2001
Springer
14 years 9 days ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
USS
2010
13 years 5 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...