Sciweavers

8177 search results - page 513 / 1636
» Detecting System Emulators
Sort
View
APIN
2010
172views more  APIN 2010»
15 years 5 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...
165
Voted
CGF
2010
210views more  CGF 2010»
15 years 5 months ago
Fast and Scalable CPU/GPU Collision Detection for Rigid and Deformable Surfaces
We present a new hybrid CPU/GPU collision detection technique for rigid and deformable objects based on spatial subdivision. Our approach efficiently exploits the massive computat...
Simon Pabst, Artur Koch, Wolfgang Straßer
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 5 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 5 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
152
Voted
CORR
2008
Springer
140views Education» more  CORR 2008»
15 years 5 months ago
Adaptive Spam Detection Inspired by a Cross-Regulation Model of Immune Dynamics: A Study of Concept Drift
Abstract. This paper proposes a novel solution to spam detection inspired by a model of the adaptive immune system known as the crossregulation model. We report on the testing of a...
Alaa Abi-Haidar, Luis Mateus Rocha