Sciweavers

357 search results - page 69 / 72
» Intrusion Detection System Based on Multi-class SVM
Sort
View
WWW
2008
ACM
14 years 7 months ago
Learning transportation mode from raw gps data for geographic applications on the web
Geographic information has spawned many novel Web applications where global positioning system (GPS) plays important roles in bridging the applications and end users. Learning kno...
Yu Zheng, Like Liu, Longhao Wang, Xing Xie
STORAGESS
2005
ACM
14 years 14 days ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
GECCO
2008
Springer
206views Optimization» more  GECCO 2008»
13 years 8 months ago
Improving accuracy of immune-inspired malware detectors by using intelligent features
In this paper, we show that a Bio-inspired classifier’s accuracy can be dramatically improved if it operates on intelligent features. We propose a novel set of intelligent feat...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
RAID
2010
Springer
13 years 5 months ago
GrAVity: A Massively Parallel Antivirus Engine
Abstract. In the ongoing arms race against malware, antivirus software is at the forefront, as one of the most important defense tools in our arsenal. Antivirus software is flexib...
Giorgos Vasiliadis, Sotiris Ioannidis
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw