Sciweavers

655 search results - page 45 / 131
» A behavioral approach to worm detection
Sort
View
AMI
2010
Springer
14 years 7 months ago
An Agent-Based Approach to Care in Independent Living
This paper presents a multi-agent system for the care of elderly people living at home on their own, with the aim to prolong their independence. The system is composed of seven gro...
Bostjan Kaluza, Violeta Mirchevska, Erik Dovgan, M...
AINA
2010
IEEE
15 years 1 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores
ACMSE
2004
ACM
15 years 3 months ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart
PAKDD
2005
ACM
133views Data Mining» more  PAKDD 2005»
15 years 3 months ago
An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning
This paper proposes a novel anomaly detection system for spacecrafts based on data mining techniques. It constructs a nonlinear probabilistic model w.r.t. behavior of a spacecraft ...
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida
COMPSAC
2005
IEEE
15 years 3 months ago
Constraint Violation Detection: A Fundamental Part of Software Cybernetics
Monitoring of sensitive events is a key step for controlling the behavior of software. Specifying a sufficient set of constraints prior to software deployment is necessary for det...
Qianxiang Wang