Sciweavers

51 search results - page 7 / 11
» Using Adaptive Alert Classification to Reduce False Positive...
Sort
View
IMC
2009
ACM
14 years 1 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ASIAMS
2008
IEEE
14 years 1 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
ICASSP
2011
IEEE
12 years 10 months ago
Combining generic and class-specific codebooks for object categorization and detection
Combining advantages of shape and appearance features, we propose a novel model that integrates these two complementary features into a common framework for object categorization ...
Hong Pan, Yaping Zhu, Liang-Zheng Xia, Truong Q. N...
IMC
2006
ACM
14 years 29 days ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
WEBI
2009
Springer
14 years 1 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham