Sciweavers

152 search results - page 17 / 31
» Measuring intrusion detection capability: an information-the...
Sort
View
ACSAC
2009
IEEE
14 years 5 months ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen
ICPR
2008
IEEE
14 years 4 months ago
On-line novelty detection using the Kalman filter and extreme value theory
Novelty detection is concerned with identifying abnormal system behaviours and abrupt changes from one regime to another. This paper proposes an on-line (causal) novelty detection...
Hyoungjoo Lee, Stephen J. Roberts
CCS
2010
ACM
13 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
IPPS
2010
IEEE
13 years 8 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
CVPR
2007
IEEE
15 years 12 days ago
A boosting regression approach to medical anatomy detection
The state-of-the-art object detection algorithm learns a binary classifier to differentiate the foreground object from the background. Since the detection algorithm exhaustively s...
Shaohua Kevin Zhou, Jinghao Zhou, Dorin Comaniciu