Sciweavers

1804 search results - page 119 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
186
Voted
JCDL
2011
ACM
374views Education» more  JCDL 2011»
14 years 1 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
98
Voted
HASE
2008
IEEE
15 years 4 months ago
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications
Web applications often use dynamic pages that interact with each other by accessing shared objects, e.g., session objects. Interactions between dynamic pages need to be carefully ...
Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacke...
ACSAC
2008
IEEE
15 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
67
Voted
IADIS
2004
14 years 11 months ago
On the use of web service compositions for systems management automation: a use case
In this paper we address the issue of automating systems management. Currently, any changes made in the configuration settings of the IT infrastructure in an enterprise are perfor...
Dimka Karastoyanova, Alejandro P. Buchmann
WACV
2005
IEEE
15 years 3 months ago
Automatic 2D Hand Tracking in Video Sequences
In gesture and sign language video sequences, hand motion tends to be rapid, and hands frequently appear in front of each other or in front of the face. Thus, hand location is oft...
Quan Yuan, Stan Sclaroff, Vassilis Athitsos