Sciweavers

6846 search results - page 1122 / 1370
» Developing an Active Observer
Sort
View
CIE
2008
Springer
15 years 4 months ago
Designing new interfaces for digital interactive television usable by older adults
The adoption of digital television (DTV) could be particularly attractive for older people if appropriately designed. Despite this, when new services and applicat...
Mark Rice, Norman Alm
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 4 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
131
Voted
CORR
2010
Springer
111views Education» more  CORR 2010»
15 years 4 months ago
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for...
Abdullah Al Hasib, Abdullah Azfar, Md. Sarwar Mors...
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 4 months ago
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS ...
S. Sangeetha, V. Vaidehi
CORR
2010
Springer
167views Education» more  CORR 2010»
15 years 4 months ago
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation ...
Julie Greensmith, Jan Feyereisl, Uwe Aickelin
« Prev « First page 1122 / 1370 Last » Next »