Sciweavers

1804 search results - page 160 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
JCP
2008
116views more  JCP 2008»
15 years 4 months ago
Sensor Location Strategy in Large-Scale Systems for Fault Detection Applications
Fault detection in large-scale systems is conducted by the use of sensors, thus the sensor location influences the performances of fault detection directly. As the scale of systems...
Fan Yang, Deyun Xiao
ICAPR
2001
Springer
15 years 9 months ago
A Neural Multi-expert Classification System for MPEG Audio Segmentation
The current research efforts in the field of video parsing and analysis are mainly focused on the use of pictorial information, while neglecting an important supplementary source ...
Massimo De Santo, Gennaro Percannella, Carlo Sanso...
FAST
2004
15 years 5 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
ATC
2009
Springer
15 years 7 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
14 years 11 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...