Sciweavers

201 search results - page 18 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
IJDE
2007
105views more  IJDE 2007»
14 years 11 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
CORR
2010
Springer
124views Education» more  CORR 2010»
14 years 11 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
ICC
2007
IEEE
150views Communications» more  ICC 2007»
15 years 5 months ago
Joint Maximum Likelihood Channel Estimation and Data Detection for MIMO Systems
— Blind and semiblind adaptive schemes are proposed for joint maximum likelihood (ML) channel estimation and data detection for multiple-input multiple-output (MIMO) systems. The...
Mohammed Abuthinien, Sheng Chen, Andreas Wolfgang,...
DICTA
2009
15 years 3 days ago
Modeling Image Context Using Object Centered Grid
Abstract--Context plays a valuable role in any image understanding task confirmed by numerous studies which have shown the importance of contextual information in computer vision t...
Sobhan Naderi Parizi, Ivan Laptev, Alireza Tavakol...
ICARIS
2007
Springer
15 years 5 months ago
Towards a Novel Immune Inspired Approach to Temporal Anomaly Detection
Abstract. In this conceptual paper, we report on studies and initial definitions of an immune-inspired approach to temporal anomaly detection problems, where there is a strict temp...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....