Sciweavers

173 search results - page 24 / 35
» Dynamic information source selection for intrusion detection...
Sort
View
79
Voted
AINA
2006
IEEE
15 years 3 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
CVPR
2004
IEEE
15 years 11 months ago
A Unified Framework for Uncertainty Propagation in Automatic Shape Tracking
Uncertainty handling plays an important role during shape tracking. We have recently shown that the fusion of measurement information with system dynamics and shape priors greatly...
Xiang Sean Zhou, Dorin Comaniciu, Binglong Xie, R....
102
Voted
WCRE
1995
IEEE
15 years 1 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...
181
Voted
ICDE
2009
IEEE
130views Database» more  ICDE 2009»
15 years 11 months ago
Recursive Computation of Regions and Connectivity in Networks
In recent years, the data management community has begun to consider situations in which data access is closely tied to network routing and distributed acquisition: examples includ...
Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Za...
NDSS
2008
IEEE
15 years 4 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...