Sciweavers

1804 search results - page 194 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 4 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
CISS
2008
IEEE
15 years 11 months ago
A distributed scheme for detection of information flows
—Distributed detection of information flows spanning many nodes in a wireless sensor network is considered. In such a system, eavesdroppers are deployed near several nodes in th...
Ameya Agaskar, Lang Tong, Ting He
WSCG
2003
310views more  WSCG 2003»
15 years 6 months ago
Effective Shadow Detection in Traffic Monitoring Applications
This paper presents work we have done in detecting moving shadows in the context of an outdoor traffic scene for visual surveillance purposes. The algorithm just exploits some for...
Alessandro Bevilacqua
IMC
2003
ACM
15 years 9 months ago
Bitmap algorithms for counting active flows on high speed links
—This paper presents a family of bitmap algorithms that address the problem of counting the number of distinct header patterns (flows) seen on a high-speed link. Such counting c...
Cristian Estan, George Varghese, Mike Fisk
173
Voted
AIM
2002
15 years 4 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe