Misuse detection

Results: 20



#Item
1Radioactivity / Statistical inference / Analytical chemistry / Detection limit / Hypothesis testing / Ionizing radiation / Statistical hypothesis testing / Background radiation / Radiation / Statistics / Science / Measurement

Making Counting Decisions Use/Misuse of Sample Statistics John Doroski Pat Donahue Indian Pont, Entergy

Add to Reading List

Source URL: hps.ne.uiuc.edu

Language: English - Date: 2014-06-17 11:45:22
2Computer security / Data mining / Statistics / Spamming / Anomaly detection / Intrusion detection system / Network intrusion detection system / Misuse detection / Snort / Computer network security / Data security / Computing

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-03-05 21:14:30
3Computer vision / Anomaly detection / Intrusion detection system / Misuse detection / Synthetic data / Feature / Receiver operating characteristic / Statistics / Data security / Data mining

Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1 Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-08-08 19:37:58
4Data mining / Anomaly detection / Misuse detection / Intrusion detection system / Synthetic data / Host-based intrusion detection system / Feature / Information / Data security / Statistics / Information technology management

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-01-26 18:38:00
5Cyberwarfare / Computing / Anomaly detection / Data mining / Intrusion detection system / Misuse detection / Anomaly-based intrusion detection system / Bro / Intrusion detection system evasion techniques / Computer network security / Computer security / Data security

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Add to Reading List

Source URL: www.s0ftpj.org

Language: English - Date: 2006-07-14 18:58:00
6Computer security / Intrusion detection system / Anomaly detection / Misuse detection / Burglar alarm / Intrusion detection system evasion techniques / OSSIM / Security / Data security / Computer network security

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Detecting 0-day attacks with

Add to Reading List

Source URL: www.s0ftpj.org

Language: English - Date: 2007-01-25 16:48:54
7Data mining / Anomaly detection / Intrusion detection system / Computer security / Anomaly / Misuse detection / Outlier / Anomaly-based intrusion detection system / Statistics / Data security / Data analysis

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-10 13:37:55
8Cross-platform software / Relational database management systems / Statistics / Database management systems / Oracle Data Mining / Anomaly detection / Intrusion detection system / Misuse detection / Oracle RAC / Software / Data security / Computing

Microsoft Word - CamposMilenovaICDM05_8pages.doc

Add to Reading List

Source URL: www.oracle.com

Language: English
9

IDS製品調査 [removed] 不正アクセス検知の分類 • 不正検知(Misuse Detection)

Add to Reading List

Source URL: www.npa.go.jp

Language: Japanese
    10Information technology management / Computing / Anomaly detection / Data mining / Data modeling / Query string / Misuse detection / Database / Intrusion detection system / Data security / Database theory / Data management

    ARTICLE IN PRESS Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet A multi-model approach to the detection of web-based attacks

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2005-05-30 18:56:39
    UPDATE