Sciweavers

1051 search results - page 101 / 211
» Analyzing Resource Behavior Using Process Mining
Sort
View
VTS
2005
IEEE
145views Hardware» more  VTS 2005»
15 years 6 months ago
Hardware Results Demonstrating Defect Detection Using Power Supply Signal Measurements
The power supply transient signal (IDDT) method that we propose for defect detection analyze regional signal variations introduced by defects at a set of power supply pads on the ...
Dhruva Acharyya, Jim Plusquellic
121
Voted
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
15 years 7 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
CEAS
2008
Springer
15 years 2 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
94
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
93
Voted
KES
2008
Springer
15 years 18 days ago
Epileptic Seizure Classification Using Neural Networks with 14 Features
Epilepsy is one of the most frequent neurological disorders. The main method used in epilepsy diagnosis is electroencephalogram (EEG) signal analysis. However this method requires ...
Rui P. Costa, Pedro Oliveira, Guilherme Rodrigues,...