Sciweavers

2236 search results - page 285 / 448
» Intrusion detection techniques and approaches
Sort
View
DASC
2006
IEEE
14 years 2 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
COLING
2010
13 years 5 months ago
Inducing Fine-Grained Semantic Classes via Hierarchical and Collective Classification
Research in named entity recognition and mention detection has typically involved a fairly small number of semantic classes, which may not be adequate if semantic class informatio...
Md. Altaf ur Rahman, Vincent Ng
ICAPR
2005
Springer
14 years 4 months ago
Weighted Adaptive Neighborhood Hypergraph Partitioning for Image Segmentation
Abstract. The aim of this paper is to present an improvement of a previously published algorithm. The proposed approach is performed in two steps. In the first step, we generate t...
Soufiane Rital, Hocine Cherifi, Serge Miguet
ICDM
2010
IEEE
199views Data Mining» more  ICDM 2010»
13 years 8 months ago
Addressing Concept-Evolution in Concept-Drifting Data Streams
Abstract--The problem of data stream classification is challenging because of many practical aspects associated with efficient processing and temporal behavior of the stream. Two s...
Mohammad M. Masud, Qing Chen, Latifur Khan, Charu ...
CCS
2007
ACM
14 years 4 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...