Sciweavers

3785 search results - page 199 / 757
» Immune System Based Intrusion Detection System
Sort
View
141
Voted
IEAAIE
2003
Springer
15 years 10 months ago
SumTime-Turbine: A Knowledge-Based System to Communicate Gas Turbine Time-Series Data
Abstract: SumTime-Turbine produces textual summaries of archived timeseries data from gas turbines. These summaries should help experts understand large data sets that cannot be vi...
Jin Yu, Ehud Reiter, Jim Hunter, Somayajulu Sripad...
129
Voted
CSFW
1998
IEEE
15 years 9 months ago
Data Level Inference Detection in Database Systems
Existing work on inference detection for database systems mainly employ functional dependencies in the database schema to detect inferences. It has been noticed that analyzing the...
Raymond W. Yip, Karl N. Levitt
HASE
1998
IEEE
15 years 8 months ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
ICIC
2007
Springer
15 years 11 months ago
Unbalanced Underground Distribution Systems Fault Detection and Section Estimation
This paper presents a novel fault detection and section estimation method for unbalanced underground distribution systems (UDS). The method proposed is based on artificial neural n...
Karen Rezende Caino de Oliveira, Rodrigo Hartstein...
134
Voted
MATA
2004
Springer
149views Communications» more  MATA 2004»
15 years 10 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...