Sciweavers

8177 search results - page 332 / 1636
» Detecting System Emulators
Sort
View
ADHOCNETS
2009
Springer
15 years 8 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
128
Voted
IH
1999
Springer
15 years 7 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
137
Voted
FPGA
2006
ACM
156views FPGA» more  FPGA 2006»
15 years 7 months ago
A reconfigurable architecture for network intrusion detection using principal component analysis
In this paper, we develop an architecture for principal component analysis (PCA) to be used as an outlier detection method for high-speed network intrusion detection systems (NIDS...
David T. Nguyen, Gokhan Memik, Alok N. Choudhary
ACSAC
2001
IEEE
15 years 7 months ago
Implementing the Intrusion Detection Exchange Protocol
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
123
Voted
MEDINFO
2007
116views Healthcare» more  MEDINFO 2007»
15 years 5 months ago
Improving Computer Aided Disease Detection Using Knowledge of Disease Appearance
The accurate quantification of disease patterns in medical images allows radiologists to track the progress of a disease. Various computer vision techniques are able to automatica...
Tatjana Zrimec, James S. J. Wong