Login / Signup
Exploiting Execution Context for the Detection of Anomalous System Calls.
Darren Mutz
William K. Robertson
Giovanni Vigna
Richard A. Kemmerer
Published in:
RAID (2007)
Keyphrases
</>
anomaly detection
detection algorithm
object detection
false alarms
data sets
context sensitive
detecting anomalous
context awareness
detection accuracy
event detection
detection method
context aware
databases
detection rate
automatic detection
hidden markov models
genetic algorithm
active databases
real time