Sciweavers

233 search results - page 18 / 47
» The Evolution of System-Call Monitoring
Sort
View
COMPSAC
2009
IEEE
14 years 4 months ago
Defending Battery Exhaustion Attacks on Mobile Systems
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Sungyong Shin, Taek Lee, Hoh Peter In
USS
2004
13 years 11 months ago
On Gray-Box Program Tracking for Anomaly Detection
Many host-based anomaly detection systems monitor a process ostensibly running a known program by observing the system calls the process makes. Numerous improvements to the precis...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
SDM
2007
SIAM
122views Data Mining» more  SDM 2007»
13 years 11 months ago
Incremental Spectral Clustering With Application to Monitoring of Evolving Blog Communities
In recent years, spectral clustering method has gained attentions because of its superior performance compared to other traditional clustering algorithms such as K-means algorithm...
Huazhong Ning, Wei Xu, Yun Chi, Yihong Gong, Thoma...
BMCBI
2008
102views more  BMCBI 2008»
13 years 10 months ago
Monitoring the evolutionary aspect of the Gene Ontology to enhance predictability and usability
Background: Much effort is currently made to develop the Gene Ontology (GO). Due to the dynamic nature of information it addresses, GO undergoes constant updates whose results are...
Jong C. Park, Tak-eun Kim, Jinah Park
JSS
2002
198views more  JSS 2002»
13 years 9 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...