Sciweavers

765 search results - page 96 / 153
» Detecting Anomalies and Intruders
Sort
View
SAC
2010
ACM
15 years 6 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
ICC
2007
IEEE
217views Communications» more  ICC 2007»
15 years 6 months ago
Decentralized Activation in a ZigBee-enabled Unattended Ground Sensor Network: A Correlated Equilibrium Game Theoretic Analysis
Abstract— We describe a decentralized learning-based activation algorithm for a ZigBee-enabled unattended ground sensor network. Sensor nodes learn to monitor their environment i...
Michael Maskery, Vikram Krishnamurthy
HICSS
2006
IEEE
127views Biometrics» more  HICSS 2006»
15 years 6 months ago
Processing of Data Streams with Prediction Functions
Networks of sensors arise naturally in many different fields, from industrial applications (e.g., monitoring of environmental parameters in a chemical plant) to surveillance appl...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...
ISER
2004
Springer
108views Robotics» more  ISER 2004»
15 years 5 months ago
The SDR Experience: Experiments with a Large-Scale Heterogeneous Mobile Robot Team
This paper reports on experiments conducted as part of the DARPA SDR (Software for Distributed Robotics) program. The core challenge for this program is to develop a system capable...
Andrew Howard, Lynne E. Parker, Gaurav S. Sukhatme
COMPSAC
2009
IEEE
15 years 3 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...