Sciweavers

1804 search results - page 212 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
IPPS
2010
IEEE
15 years 2 months ago
Hardware implementation for scalable lookahead Regular Expression detection
Regular Expressions (RegExes) are widely used in various applications to identify strings of text. Their flexibility, however, increases the complexity of the detection system and ...
Masanori Bando, N. Sertac Artan, Nishit Mehta, Yi ...
CDC
2008
IEEE
15 years 11 months ago
Shannon meets Bellman: Feature based Markovian models for detection and optimization
— The goal of this paper is to develop modeling techniques for complex systems for the purposes of control, estimation, and inference: (i) A new class of Hidden Markov Models is ...
Sean P. Meyn, George Mathew
WWW
2010
ACM
15 years 11 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
IROS
2006
IEEE
135views Robotics» more  IROS 2006»
15 years 10 months ago
Probabilistic Speaker Localization in Noisy Environments by Audio-Visual Integration
Abstract - In this paper, we have developed not only a probabilistic sound localization system including VAD (Voice Activity Detection) component using three microphones but also a...
JongSuk Choi, Munsang Kim, Hyun-Don Kim
BMCBI
2011
14 years 8 months ago
Efficient alignment of pyrosequencing reads for re-sequencing applications
Background: Over the past few years, new massively parallel DNA sequencing technologies have emerged. These platforms generate massive amounts of data per run, greatly reducing th...
Francisco Fernandes, Paulo G. S. da Fonseca, Lu&ia...