Sciweavers

8177 search results - page 536 / 1636
» Detecting System Emulators
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 5 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
ICIAP
2007
ACM
16 years 5 months ago
Window Detection in Facades
This work is about a novel methodology for window detection in urban environments and its multiple use in vision system applications. The presented method for window detection inc...
Haider Ali, Christin Seifert, Nitin Jindal, Lucas ...
MOBISYS
2008
ACM
16 years 4 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
WWW
2010
ACM
16 years 1 days ago
Earthquake shakes Twitter users: real-time event detection by social sensors
Twitter, a popular microblogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occ...
Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 11 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq