Sciweavers

169 search results - page 22 / 34
» IDGraphs: Intrusion Detection and Analysis Using Histographs
Sort
View
IPCCC
2006
IEEE
14 years 1 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
VLDB
2005
ACM
153views Database» more  VLDB 2005»
14 years 7 months ago
An effective and efficient algorithm for high-dimensional outlier detection
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
Charu C. Aggarwal, Philip S. Yu
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 8 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
BMEI
2008
IEEE
14 years 2 months ago
Performance Evaluation and Fusion of Methods for Early Detection of Alzheimer Disease
The number of people that develop Alzheimer’s Disease (AD) is rapidly rising, while the initial diagnosis and care of AD patients typically falls on non-specialist and still tak...
Brahim Hamadicharef, Cuntai Guan, Emmanuel C. Ifea...
CCS
2007
ACM
14 years 1 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia