Sciweavers

8177 search results - page 227 / 1636
» Detecting System Emulators
Sort
View
121
Voted
SRDS
1991
IEEE
15 years 4 months ago
A Fault-Tolerant, Scalable, Low-Overhead Distributed Garbage Detection Protocol
We present a protocol for the distributed detection of garbage in a distributed system subject to common failures such as lost and duplicated messages, network partition, dismount...
Marc Shapiro
100
Voted
IWSOS
2007
Springer
15 years 7 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
USENIX
2001
15 years 2 months ago
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
We present Malicious Email Filter, MEF, a freely distributed malicious binary filter incorporated into Procmail that can detect malicious Windows attachments by integrating with a...
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Man...
116
Voted
PRL
2002
102views more  PRL 2002»
15 years 13 days ago
Face detection by aggregated Bayesian network classifiers
A face detection system is presented. A new classification method using forest-structured Bayesian networks is used. The method is used in an aggregated classifier to discriminate...
Thang V. Pham, Marcel Worring, Arnold W. M. Smeuld...
105
Voted
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
14 years 10 months ago
Polynomial-time solution of change detection problems
Change detection problems are ubiquitous, but there are no existing tractable techniques for -exact solution of discrete-time, discrete-observation problems. A polynomialtime algor...
Joshua D. Isom, Robert E. LaBarre, Richard D. Braa...