Time series data are pervasive across all human endeavors, and clustering is arguably the most fundamental data mining application. Given this, it is somewhat surprising that the …
A masquerader is an (often external) attacker who, after succeeding in obtaining a legitimate user's credentials, attempts to use the stolen identity to carry out malicious actions …
L Huang, M Stamp - Computers & Security, 2011 - Elsevier
In this paper, we consider the problem of masquerade detection, based on user-issued UNIX commands. We present a novel detection technique based on profile hidden Markov …
EE Eiland, SC Evans, JD Impson, TS Markham… - US Patent …, 2012 - Google Patents
This application is directed to an invention (s) that was made as a result of activities undertaken within the scope of a Joint Research Agreement made between Lockheed …
S Sen - International Journal of Information Security, 2014 - Springer
Although there are many approaches proposed for masquerade detection in the literature, few of them consider concept drift; the problem of distinguishing malicious behaviours from …
Social agents with finitely nested opponent models are vulnerable to manipulation by agents with deeper reasoning and more sophisticated opponent modelling. This imbalance, rooted …
JE Tapiador, JA Clark - 2010 Fourth International Conference …, 2010 - ieeexplore.ieee.org
In a masquerade attack, an adversary who has stolen a legitimate user's credentials attempts to impersonate him to carry out malicious actions. Automatic detection of such …
A Saber, F Di Troia, M Stamp - Digital forensic investigation of Internet of …, 2021 - Springer
In this chapter, we consider intrusion detection systems (IDS) in the context of an automotive controller area network (CAN), which is also known as the CAN bus. We provide a …