Sciweavers

1804 search results - page 122 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
92
Voted
MVA
2007
162views Computer Vision» more  MVA 2007»
14 years 9 months ago
Location-Based Tracking of Moving Obstacles from a Mobile Robot
Tracking moving obstacles from a moving platform is a useful skill for the coming generation of mobile robot. The methods used in existing moving objects tracking that operated fr...
Thatsaphan Suwannathat, Jun-ichi Imai, Masahide Ka...
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 4 months ago
XFA: Faster Signature Matching with Extended Automata
Automata-based representations and related algorithms have been applied to address several problems in information security, and often the automata had to be augmented with additi...
Randy Smith, Cristian Estan, Somesh Jha
ICC
2007
IEEE
150views Communications» more  ICC 2007»
15 years 4 months ago
Joint Maximum Likelihood Channel Estimation and Data Detection for MIMO Systems
— Blind and semiblind adaptive schemes are proposed for joint maximum likelihood (ML) channel estimation and data detection for multiple-input multiple-output (MIMO) systems. The...
Mohammed Abuthinien, Sheng Chen, Andreas Wolfgang,...
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
14 years 11 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
CORR
2010
Springer
101views Education» more  CORR 2010»
14 years 10 months ago
Construction and Applications of CRT Sequences
Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the p...
Kenneth W. Shum, Wing Shing Wong