Sciweavers

81 search results - page 16 / 17
» Building an Intrusion-Detection System to Detect Suspicious ...
Sort
View
ICRA
2009
IEEE
162views Robotics» more  ICRA 2009»
13 years 12 months ago
Distributed sensor analysis for fault detection in tightly-coupled multi-robot team tasks
— This paper presents a distributed version of our previous work, called SAFDetection, which is a sensor analysisbased fault detection approach that is used to monitor tightlycou...
Xingyan Li, Lynne E. Parker
IAT
2008
IEEE
13 years 11 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
CORR
2010
Springer
79views Education» more  CORR 2010»
13 years 5 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 5 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
13 years 11 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...