Sciweavers

6 search results - page 1 / 2
» Time Discretisation Applied to Anomaly Detection in a Marine...
Sort
View
KES
2007
Springer
13 years 11 months ago
Time Discretisation Applied to Anomaly Detection in a Marine Engine
This paper introduces the problems associated with anomaly detection in a marine engine, and explains the benefits that the SAX representation brings to the field. Despite limita...
Ian Morgan, Honghai Liu, George Turnbull, David J....
CSMR
2008
IEEE
13 years 11 months ago
Visual Detection of Design Anomalies
Design anomalies, introduced during software evolution, are frequent causes of low maintainability and low flexibility to future changes. Because of the required knowledge, an im...
Karim Dhambri, Houari A. Sahraoui, Pierre Poulin
UCS
2007
Springer
13 years 11 months ago
D-FLER - A Distributed Fuzzy Logic Engine for Rule-Based Wireless Sensor Networks
Abstract. We propose D-FLER, a distributed, general-purpose reasoning engine for WSN. D-FLER uses fuzzy logic for fusing individual and neighborhood observations, in order to produ...
Mihai Marin-Perianu, Paul J. M. Havinga
ACSAC
2008
IEEE
13 years 11 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ICARIS
2007
Springer
13 years 11 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...