Sciweavers

8177 search results - page 353 / 1636
» Detecting System Emulators
Sort
View
114
Voted
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 4 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
125
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Cooperative Spectrum Sensing and Detection for Cognitive Radio
—One of the main requirements of cognitive radio systems is the ability to reliably detect the presence of licensed primary transmissions. Previous works on the problem of detect...
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli
135
Voted
CVPR
2006
IEEE
15 years 9 months ago
Towards Multi-View Object Class Detection
We present a novel system for generic object class detection. In contrast to most existing systems which focus on a single viewpoint or aspect, our approach can detect object inst...
Alexander Thomas, Vittorio Ferrari, Bastian Leibe,...
118
Voted
ARC
2006
Springer
122views Hardware» more  ARC 2006»
15 years 7 months ago
UNITE: Uniform Hardware-Based Network Intrusion deTection Engine
Abstract. Current software implementations of network intrusion detection reach a maximum network connection speed of about 1Gbps (Gigabits per second). This paper analyses the Sno...
Sherif Yusuf, Wayne Luk, M. K. N. Szeto, William G...
131
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
—One of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper we explore t...
Jorge Blasco Alís, Agustín Orfila, A...