Sciweavers

429 search results - page 56 / 86
» Multivariate statistical analysis for network attacks detect...
Sort
View
RAID
2010
Springer
13 years 6 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
CCS
2003
ACM
14 years 1 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CCS
2007
ACM
14 years 2 days ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
14 years 27 days ago
Initialization parameter sweep in ATHENA: optimizing neural networks for detecting gene-gene interactions in the presence of sma
Recent advances in genotyping technology have led to the generation of an enormous quantity of genetic data. Traditional methods of statistical analysis have proved insufficient i...
Emily Rose Holzinger, Carrie C. Buchanan, Scott M....
IPMI
2001
Springer
14 years 9 months ago
Spatio-temporal Covariance Model for Medical Images Sequences: Application to Functional MRI Data
Spatial and temporal correlations which affect the signal measured in functional MRI (fMRI) are usually not considered simultaneously (i.e., as non-independent random processes) in...
Frithjof Kruggel, Habib Benali, Mélanie P&e...