Sciweavers

8177 search results - page 381 / 1636
» Detecting System Emulators
Sort
View
129
Voted
AINA
2007
IEEE
15 years 10 months ago
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Natalia Stakhanova, Samik Basu, Johnny Wong
AINA
2007
IEEE
15 years 10 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
ISCAS
2007
IEEE
166views Hardware» more  ISCAS 2007»
15 years 10 months ago
Computing Criticality of Lines in Power Systems
— We propose a computationally efficient method based on nonlinear optimization to identify critical lines, failure of which can cause severe blackouts. Our method computes crit...
Ali Pinar, Adam Reichert, Bernard C. Lesieutre
SEKE
2007
Springer
15 years 10 months ago
Real-Time Trust Management in Agent Based Online Auction Systems
Agent based online auctions have not yet become popular because they are not trustable. One of the major concerns in agent based online auctions is the shilling behavior problem, w...
Rinkesh Patel, Haiping Xu, Ankit Goel
ICRA
2003
IEEE
163views Robotics» more  ICRA 2003»
15 years 9 months ago
A real-time robust eye tracking system for autostereoscopic displays using stereo cameras
− Autostereoscopic display systems can provide users a natural 3-D visualization environment by projecting stereo video onto the user's eyes. Eye position localization is a ...
Chan-Hung Su, Yong-Sheng Chen, Yi-Ping Hung, Chu-S...