<--- Back to Details
First PageDocument Content
Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software
Date: 2006-10-19 19:27:44
Information technology management
Software
Computer security
Computer network security
Anomaly detection
Data mining
Intrusion detection system
Windows Registry
Malware
System software
Data security
Antivirus software

A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

Add to Reading List

Source URL: www.gatsby.ucl.ac.uk

Download Document from Source Website

File Size: 252,75 KB

Share Document on Facebook

Similar Documents

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

DocID: 1xTRV - View Document

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

DocID: 1xTRg - View Document

Anomaly detection based on real-time exploitation of billing systems

Anomaly detection based on real-time exploitation of billing systems

DocID: 1xTmR - View Document

Anomaly Detection in Hyperspectral Images of Complex Scenes Dirk BORGHYS a,1 , Elie TRUYEN a Michal SHIMONI a and Christiaan PERNEEL b a Royal Military Academy, Signal & Image Centre, Brussels, Belgium b Royal Military A

Anomaly Detection in Hyperspectral Images of Complex Scenes Dirk BORGHYS a,1 , Elie TRUYEN a Michal SHIMONI a and Christiaan PERNEEL b a Royal Military Academy, Signal & Image Centre, Brussels, Belgium b Royal Military A

DocID: 1vnK6 - View Document

An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

DocID: 1vlla - View Document