Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
The number of people that develop Alzheimer’s Disease (AD) is rapidly rising, while the initial diagnosis and care of AD patients typically falls on non-specialist and still tak...
Brahim Hamadicharef, Cuntai Guan, Emmanuel C. Ifea...
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...