Sciweavers

5435 search results - page 45 / 1087
» Informed Detection Revisited
Sort
View
INFOCOM
2007
IEEE
15 years 8 months ago
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...
Ritesh Maheshwari, Jie Gao, Samir R. Das
DKE
2007
99views more  DKE 2007»
15 years 1 months ago
Interaction pattern detection in process oriented information systems
Finding interaction patterns is a challenging problem, but this kind of information about processes or social networks might be useful for an organization’s management to unders...
Schahram Dustdar, Thomas Hoffmann
ICPR
2008
IEEE
16 years 3 months ago
Detecting moving text in video using temporal information
This paper presents our work on automatically detecting moving rigid text in digital videos. The temporal information is obtained by dividing a video frame into sub-blocks and cal...
Chew Lim Tan, Palaiahnakote Shivakumara, Weihua Hu...
MMMACNS
2005
Springer
15 years 7 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
SEC
2008
15 years 3 months ago
Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs
Design diversity is a well-known method to ensure fault tolerance. Such a method has also been applied successfully in various projects to provide intrusion detection and tolerance...
Frédéric Majorczyk, Eric Totel, Ludo...