Sciweavers

417 search results - page 32 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
ISESE
2005
IEEE
14 years 1 months ago
Exploratory testing: a multiple case study
Exploratory testing (ET) – simultaneous learning, test design, and test execution – is an applied practice in industry but lacks research. We present the current knowledge of ...
Juha Itkonen, Kristian Rautiainen
WER
2004
Springer
14 years 1 months ago
Structural Testing with Use Cases
Understanding how a user interacts with a system is important if the goal is to deliver a product that meets the user's needs. Use cases constitute a primary source of require...
Adriana Carniello, Mario Jino, Marcos Lordello Cha...
CN
2000
95views more  CN 2000»
13 years 7 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
RAID
2001
Springer
14 years 6 days ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson