Sciweavers

328 search results - page 32 / 66
» Detection, Analysis and Matching of Hair
Sort
View
100
Voted
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
91
Voted
BMCBI
2010
161views more  BMCBI 2010»
14 years 10 months ago
BPDA - A Bayesian peptide detection algorithm for mass spectrometry
Background: Mass spectrometry (MS) is an essential analytical tool in proteomics. Many existing algorithms for peptide detection are based on isotope template matching and usually...
Youting Sun, Jianqiu Zhang, Ulisses Braga-Neto, Ed...
126
Voted
CCS
2011
ACM
13 years 10 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
110
Voted
IJNSEC
2006
96views more  IJNSEC 2006»
14 years 10 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
SCN
2008
Springer
136views Communications» more  SCN 2008»
14 years 10 months ago
An efficient data structure for network anomaly detection
Abstract-- Despite the rapid advance in networking technologies, detection of network anomalies at high-speed switches/routers is still far from maturity. To push the frontier, two...
Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci