Sciweavers

3785 search results - page 148 / 757
» Immune System Based Intrusion Detection System
Sort
View
EUROSYS
2008
ACM
16 years 1 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ICC
2007
IEEE
175views Communications» more  ICC 2007»
15 years 11 months ago
An Adaptive MIMO System Based on Unified Belief Propagation Detection
—An adaptive multiple input and multiple output with the code matrix index feedback [8]. One detector will (MIMO) system based on the unified belief propagation (BP) work in the ...
Xiumei Yang, Yong Xiong, Fan Wang
EAAI
2007
101views more  EAAI 2007»
15 years 4 months ago
Fault detection for nonlinear systems with uncertain parameters based on the interval fuzzy model
In the paper an application of the interval fuzzy model (INFUMO) in fault detection for nonlinear systems with uncertain intervaltype parameters is presented. A confidence band f...
Simon Oblak, Igor Skrjanc, Saso Blazic
INFOCOM
2008
IEEE
15 years 11 months ago
Run-Time System for Scalable Network Services
Sophisticated middlebox services–such as network monitoring and intrusion detection, DDoS mitigation, worm scanning, XML parsing and protocol transformation–are becoming incre...
Upendra Shevade, Ravi Kokku, Harrick M. Vin
CGO
2007
IEEE
15 years 11 months ago
Evaluating Indirect Branch Handling Mechanisms in Software Dynamic Translation Systems
Software Dynamic Translation (SDT) systems are used for program instrumentation, dynamic optimization, security, intrusion detection, and many other uses. As noted by many researc...
Jason Hiser, Daniel Williams, Wei Hu, Jack W. Davi...