Sciweavers

1804 search results - page 155 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
CORR
2010
Springer
131views Education» more  CORR 2010»
15 years 4 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
IWPSE
2003
IEEE
15 years 9 months ago
CVS Release History Data for Detecting Logical Couplings
The dependencies and interrelations between classes and modules affect the maintainability of object-oriented systems. It is therefore important to capture weaknesses of the softw...
Harald Gall, Mehdi Jazayeri, Jacek Krajewski
BMCBI
2010
103views more  BMCBI 2010»
15 years 4 months ago
MTRAP: Pairwise sequence alignment algorithm by a new measure based on transition probability between two consecutive pairs of r
Background: Sequence alignment is one of the most important techniques to analyze biological systems. It is also true that the alignment is not complete and we have to develop it ...
Toshihide Hara, Keiko Sato, Masanori Ohya
ICAPR
2005
Springer
15 years 10 months ago
Millimetre-Wave Personnel Scanners for Automated Weapon Detection
The ATRIUM project aims to the automatic detection of threats hidden under clothes using millimetre-wave imaging. We describe a simulator of realistic millimetre-wave images and a...
Beatriz Grafulla-González, Christopher D. H...
CIKM
2005
Springer
15 years 10 months ago
Detecting changes on unordered XML documents using relational databases: a schema-conscious approach
Several relational approaches have been proposed to detect the changes to XML documents by using relational databases. These approaches store the XML documents in the relational d...
Erwin Leonardi, Sourav S. Bhowmick