Sciweavers

119 search results - page 4 / 24
» NADA - Network Anomaly Detection Algorithm
Sort
View
ACSAC
2000
IEEE
14 years 9 days ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh
SAC
2008
ACM
13 years 7 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
IDEAS
2009
IEEE
108views Database» more  IDEAS 2009»
14 years 2 months ago
A logical framework for detecting anomalies in drug resistance algorithms
Luciano Caroprese, Peter M. A. Sloot, Breannd&aacu...
CIDM
2009
IEEE
14 years 2 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder