Sciweavers

8177 search results - page 269 / 1636
» Detecting System Emulators
Sort
View
ICRA
2005
IEEE
134views Robotics» more  ICRA 2005»
15 years 8 months ago
Robust Object Detection at Regions of Interest with an Application in Ball Recognition
— In this paper, we present a new combination of a biologically inspired attention system (VOCUS – Visual Object detection with a CompUtational attention System) with a robust ...
Sara Mitri, Simone Frintrop, Kai Pervölz, Har...
JSS
2002
198views more  JSS 2002»
15 years 2 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
ISCAPDCS
2004
15 years 4 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
ICEIS
2002
IEEE
15 years 8 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
DGO
2009
88views Education» more  DGO 2009»
15 years 4 months ago
Attribute-value specification in customs fraud detection: a human-aided approach
With the growing importance of foreign commerce comes also greater opportunities for fraudulent behaviour. As such, governments must try to detect frauds as soon as they take plac...
Norton Trevisan Roman, Cristiano D. Ferreira, Luis...