Sciweavers

8177 search results - page 121 / 1636
» Detecting System Emulators
Sort
View
RAID
2000
Springer
15 years 4 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
107
Voted
AVI
2008
15 years 1 months ago
Visualizing program similarity in the Ac plagiarism detection system
Programming assignments are easy to plagiarize in such a way as to foil casual reading by graders. Graders can resort to automatic plagiarism detection systems, which can generate...
Manuel Freire
84
Voted
IJCNN
2007
IEEE
15 years 7 months ago
Faults Detection and Isolation Based On Neural Networks Applied to a Levels Control System
Abstract— Each time more grows the necessity of guaranteeing itself security and trustworthiness of the equipment during the execution of the industrials processes. Then, it is v...
Raphaela G. Fernandes, Diego R. Cabral Silva, Luiz...
109
Voted
EUROSEC
2010
ACM
15 years 7 months ago
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
Antonis Papadogiannakis, Michalis Polychronakis, E...
92
Voted
IROS
2009
IEEE
114views Robotics» more  IROS 2009»
15 years 7 months ago
A Distributed boundary detection algorithm for multi-robot systems
— We describe a distributed boundary detection algorithm suitable for use on multi-robot systems with dynamic network topologies. We assume that each robot has access to its loca...
James McLurkin, Erik D. Demaine