Time series epenthesis: Clustering time series streams requires ignoring some data

T Rakthanmanon, EJ Keogh… - 2011 IEEE 11th …, 2011 - ieeexplore.ieee.org
Given the pervasiveness of time series data in all human endeavors, and the ubiquity of
clustering as a data mining application, it is somewhat surprising that the problem of time …

MDL-based time series clustering

T Rakthanmanon, EJ Keogh, S Lonardi… - … and information systems, 2012 - Springer
Time series data are pervasive across all human endeavors, and clustering is arguably the
most fundamental data mining application. Given this, it is somewhat surprising that the …

Masquerade mimicry attack detection: A randomised approach

JE Tapiador, JA Clark - Computers & Security, 2011 - Elsevier
A masquerader is an (often external) attacker who, after succeeding in obtaining a legitimate
user's credentials, attempts to use the stolen identity to carry out malicious actions …

Masquerade detection using profile hidden Markov models

L Huang, M Stamp - Computers & Security, 2011 - Elsevier
In this paper, we consider the problem of masquerade detection, based on user-issued
UNIX commands. We present a novel detection technique based on profile hidden Markov …

Network intrusion detection using MDL compress for deep packet inspection

EE Eiland, SC Evans, JD Impson, TS Markham… - US Patent …, 2012 - Google Patents
This application is directed to an invention (s) that was made as a result of activities
undertaken within the scope of a Joint Research Agreement made between Lockheed …

Using instance-weighted naive Bayes for adapting concept drift in masquerade detection

S Sen - International Journal of Information Security, 2014 - Springer
Although there are many approaches proposed for masquerade detection in the literature,
few of them consider concept drift; the problem of distinguishing malicious behaviours from …

Detecting and Deterring Manipulation in a Cognitive Hierarchy

N Alon, L Schulz, JM Barnby, JS Rosenschein… - arXiv preprint arXiv …, 2024 - arxiv.org
Social agents with finitely nested opponent models are vulnerable to manipulation by agents
with deeper reasoning and more sophisticated opponent modelling. This imbalance, rooted …

Information-theoretic detection of masquerade mimicry attacks

JE Tapiador, JA Clark - 2010 Fourth International Conference …, 2010 - ieeexplore.ieee.org
In a masquerade attack, an adversary who has stolen a legitimate user's credentials
attempts to impersonate him to carry out malicious actions. Automatic detection of such …

[PDF][PDF] 基于命令紧密度的用户伪装入侵检测方法

王秀利, 王永吉 - 电子学报, 2014 - ejournal.org.cn
根据Unix 系统中用户的历史命令序列, 提出一种基于命令紧密度模型的用户伪装入侵检测方法.
该方法从命令组合的角度抽取用户的行为模式. 用户经常组合使用的命令, 表现出关系紧密; …

Intrusion detection and can vehicle networks

A Saber, F Di Troia, M Stamp - Digital forensic investigation of Internet of …, 2021 - Springer
In this chapter, we consider intrusion detection systems (IDS) in the context of an automotive
controller area network (CAN), which is also known as the CAN bus. We provide a …