Sciweavers

2269 search results - page 284 / 454
» Behavioral Intrusion Detection
Sort
View
144
Voted
PERVASIVE
2005
Springer
15 years 10 months ago
Embedded Assessment: Overcoming Barriers to Early Detection with Pervasive Computing
Abstract. Embedded assessment leverages the capabilities of pervasive computing to advance early detection of health conditions. In this approach, technologies embedded in the home...
Margaret E. Morris, Stephen S. Intille, Jennifer B...
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
15 years 9 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
133
Voted
PST
2008
15 years 6 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
VIIP
2001
15 years 6 months ago
Parallel Detection of Closed Streamlines in Planar Flows
Closed streamlines are an integral part of vector field topology, since they behave like sources respectively sinks but are often neither considered nor detected. If a streamline ...
Thomas Wischgoll, Gerik Scheuermann, Hans Hagen
PRL
2006
148views more  PRL 2006»
15 years 5 months ago
An agent based evolutionary approach to path detection for off-road vehicle guidance
This paper describes an ant colony optimization approach adopted to decide on road-borders to automatically guide a vehicle developed for the DARPA Grand Challenge 2004, available...
Alberto Broggi, Stefano Cattani