Sciweavers

8177 search results - page 359 / 1636
» Detecting System Emulators
Sort
View
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
15 years 5 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
149
Voted
SEC
1996
15 years 5 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
AUTOMATICA
2006
68views more  AUTOMATICA 2006»
15 years 3 months ago
Relaxed fault detection and isolation: An application to a nonlinear case study
Given a number of possibly concurrent faults (and disturbances) that may affect a nonlinear dynamic system, it may not be possible to solve the standard fault detection and isolat...
Raffaella Mattone, Alessandro De Luca
JCP
2006
173views more  JCP 2006»
15 years 3 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
FSS
2007
167views more  FSS 2007»
15 years 3 months ago
Fuzzy fusion for skin detection
Complex image processing tasks rarely succeed through the application of just one methodology. The implementation of different methodologies, whose treatment of the input images i...
Aureli Soria-Frisch, Rodrigo Verschae, Aitor Olano