Sciweavers

1804 search results - page 129 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ISMVL
2010
IEEE
164views Hardware» more  ISMVL 2010»
15 years 9 months ago
On the Number of Products to Represent Interval Functions by SOPs with Four-Valued Variables
Abstract—Let A and B be integers such that A ≤ B. An nvariable interval function is a mapping IN[n : A, B] : {0, 1}n → {0, 1}, where IN[n : A, B](X) = 1 iff A ≤ X ≤ B. Su...
Tsutomu Sasao
108
Voted
RV
2010
Springer
119views Hardware» more  RV 2010»
15 years 2 months ago
LarvaStat: Monitoring of Statistical Properties
Execution paths expose non-functional information such as system reliability and performance, which can be collected using runtime verification techniques. Statistics gathering an...
Christian Colombo, Andrew Gauci, Gordon J. Pace
170
Voted
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
15 years 5 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara
SIGSOFT
2007
ACM
16 years 4 months ago
Symbolic message sequence charts
Message Sequence Charts (MSCs) are a widely used visual formalism for scenario-based specifications of distributed reactive systems. In its conventional usage, an MSC captures an ...
Abhik Roychoudhury, Ankit Goel, Bikram Sengupta
CCS
2004
ACM
15 years 9 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash